- Acquisition Transformation
- Advanced Computing
- Agile
- AI-Augmented Software Engineering
- Artificial Intelligence Engineering
- Cloud Computing
- Continuous Deployment of Capability
- Cyber-Physical Systems
- Cybersecurity Center Development
- Cybersecurity Engineering
- Cyber Workforce Development
- Edge Computing
- Enterprise Risk and Resilience Management
- Insider Threat
- Model-Based Systems Engineering
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Securing AI
- Security Vulnerabilities
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
An Open Source Tool to Unravel UEFI and its Vulnerabilities
This post introduces CERT UEFI Parser, a new, open source tool that uses program analysis to reveal the architecture of UEFI software, and explore this veiled source of vulnerabilities.
Read More•By Vijay S. Sarvepalli, Renae Metcalf, Cory Cohen
In Reverse Engineering for Malware Analysis
Upskilling the Federal Cybersecurity Workforce
This post details how the SEI Cyber Mission Readiness Team, in partnership with CISA, developed a series of Skilling Continuation Labs to provide unique, hands-on, immersive training to upskill the …
Read More•By Christopher Herr
In Cyber Workforce Development
The Top 10 Blog Posts of 2025
Every January on the SEI Blog, we present the 10 most-visited posts from the previous year.
Read More•By Thomas A. Longstaff
In Software Engineering Research and Development
Analyzing Partially Encrypted Network Flows with Mid-Encryption
Encrypted traffic has come to dominate network flows, which makes it difficult for traditional flow monitoring tools to maintain visibility. In this blog post we take a closer look at …
Read More•By Steven Ibarra, Mark Thomas
In Situational Awareness
Tailoring 9 Zero Trust and Security Principles to Weapon Systems
Our latest post outlines how 9 zero trust and security principles might apply to weapon systems.
Read More•By Christopher J. Alberts, Timothy Morrow, Rhonda Brown, Charles M. Wallen
In Secure Development
AI-Powered Memory Safety with the Pointer Ownership Model
This post highlights work to automate C Code Security with AI-Powered memory safety.
Read More•By David Svoboda, Lori Flynn
In Secure Development
How to Align Security Requirements and Controls to Express System Threats
This blog post presents a method that combines information about security requirements, controls, and capabilities with analysis regarding cyber threats to enable more effective risk-guided system planning.
Read More•By Elias Miller, Matthew Sisk
In Cybersecurity Engineering
From Hype to Adoption: Guiding Organizations in Their AI Journey
After a flurry of initial investments in artificial intelligence, including generative and agentic AI, many organizations are facing mixed results. The SEI is examining how organizations adopt AI and what …
Read More•By Ipek Ozkaya, Anita Carleton, Erin Harper, Natalie Schieber, Robert Edman
In AI-Augmented Software Engineering
A Model-Based Approach for Software Acquisition
The Department of War (DoW) is undergoing a significant transformation in how it acquires and develops software systems. Central to this evolution is the shift from traditional document-based processes to …
Read More•By Colin Dempsey, Jerome Hugues
In Model-Based Systems Engineering
Modeling Services with Model-Based Systems Engineering (MBSE)
This post explores an approach to designing services using model-based systems engineering (MBSE) with OMG’s Unified Architecture Framework (UAF).
Read More•By Nataliya Shevchenko, Greg Shevchenko
In Model-Based Systems Engineering
Explore Topics
- Acquisition Transformation
- Advanced Computing
- Agile
- AI-Augmented Software Engineering
- Artificial Intelligence Engineering
- Cloud Computing
- Continuous Deployment of Capability
- Cyber-Physical Systems
- Cybersecurity Center Development
- Cybersecurity Engineering
- Cyber Workforce Development
- Edge Computing
- Enterprise Risk and Resilience Management
- Insider Threat
- Model-Based Systems Engineering
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Securing AI
- Security Vulnerabilities
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
Get updates on our latest work.
Sign up to have the latest post sent to your inbox weekly.
Subscribe Get our RSS feedGet updates on our latest work.
Each week, our researchers write about the latest in software engineering, cybersecurity and artificial intelligence. Sign up to get the latest post sent to your inbox the day it's published.
Subscribe Get our RSS feed