- Acquisition Transformation
- Advanced Computing
- Agile
- AI-Augmented Software Engineering
- Artificial Intelligence Engineering
- Cloud Computing
- Continuous Deployment of Capability
- Cyber-Physical Systems
- Cybersecurity Center Development
- Cybersecurity Engineering
- Cyber Workforce Development
- Edge Computing
- Enterprise Risk and Resilience Management
- Insider Threat
- Model-Based Systems Engineering
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Securing AI
- Security Vulnerabilities
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
A Model-Based Approach for Software Acquisition
The Department of War (DoW) is undergoing a significant transformation in how it acquires and develops software systems. Central to this evolution is the shift from traditional document-based processes to …
Read More•By Colin Dempsey, Jerome Hugues
In Model-Based Systems Engineering
Modeling Services with Model-Based Systems Engineering (MBSE)
This post explores an approach to designing services using model-based systems engineering (MBSE) with OMG’s Unified Architecture Framework (UAF).
Read More•By Nataliya Shevchenko, Greg Shevchenko
In Model-Based Systems Engineering
Radio-Frequency Attacks: Securing the OSI Stack
This blog post reviews common radio frequency attacks and investigates how software and cybersecurity play key roles in these exploitations.
Read More•By Joseph McIlvenny
In Cyber-Physical Systems
What’s New in SSVC: Build, Explore, and Evolve Your Decision Models
Recent updates to the Stakeholder-Specific Vulnerability Categorization (SSVC) framework help different stakeholders to prioritize vulnerabilities according to their distinct risk appetites.
Read More•By Bon Jin Koo, Renae Metcalf, Vijay S. Sarvepalli, Allen D. Householder
In Security Vulnerabilities
Enhancing Security with Cloud Flow Logs
The SEI has a history of support for flow log analysis, including its 2025 releases (for Azure or AWS) of open-source scripts to facilitate cloud flow log analysis. This blog …
Read More•By Timothy J. Shimeall
In Cybersecurity Engineering
5 Essential Questions for Implementing the Software Acquisition Pathway and the Tools to Tackle Them
This post outlines 5 essential questions to ask before implementing the Software Acquisition Pathway (SWP) and an SEI toolset to assist in the effort.
Read More•By Eileen Wrubel, Rita C. Creel, Brigid O'Hearn
In Acquisition Transformation
A Call to Action: Building a Foundation for Model-Based Systems Engineering in Digital Engineering
The SEI brought together stakeholders who have been engaging and actively innovating in the dynamic environment of digital engineering. This blog post highlights calls to action for future work in …
Read More•By Peter Capell, Will Hayes, Jerome Hugues, Nataliya Shevchenko
In Model-Based Systems Engineering
My AI System Works…But Is It Safe to Use?
This blog post introduce System Theoretic Process Analysis (STPA), a hazard analysis technique uniquely suitable for dealing with the complexity of AI systems.
Read More•By David Schulker, Matthew Walsh, Emil Mathew
In Artificial Intelligence Engineering
7 Recommendations to Improve SBOM Quality
There is growing interest in using SBOMs to support software supply chain risk management. This post recommends seven ways to improve SBOM accuracy.
Read More•By David Tobar, Jessie Jamieson, Mark Priest, Jason Fricke
In Software Engineering Research and Development
Artificial Intelligence in National Security: Acquisition and Integration
This blog post highlights practitioner insights from a recent AI Acquisition workshop, including challenges in differentiating AI systems, guidance on when to use AI, and matching AI tools to mission …
Read More•By Paige Rishel, Carol J. Smith, Brigid O'Hearn, Rita C. Creel
In Artificial Intelligence Engineering
Explore Topics
- Acquisition Transformation
- Advanced Computing
- Agile
- AI-Augmented Software Engineering
- Artificial Intelligence Engineering
- Cloud Computing
- Continuous Deployment of Capability
- Cyber-Physical Systems
- Cybersecurity Center Development
- Cybersecurity Engineering
- Cyber Workforce Development
- Edge Computing
- Enterprise Risk and Resilience Management
- Insider Threat
- Model-Based Systems Engineering
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Securing AI
- Security Vulnerabilities
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
Get updates on our latest work.
Sign up to have the latest post sent to your inbox weekly.
Subscribe Get our RSS feedGet updates on our latest work.
Each week, our researchers write about the latest in software engineering, cybersecurity and artificial intelligence. Sign up to get the latest post sent to your inbox the day it's published.
Subscribe Get our RSS feed