<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog</title><link>http://sei.cmu.edu/feeds/latest/</link><description>Updates on changes and additions to the SEI Blog.</description><atom:link href="http://sei.cmu.edu/blog/feeds/latest/rss/" rel="self"/><language>en-us</language><lastBuildDate>Wed, 06 May 2026 00:00:00 -0400</lastBuildDate><item><title>The ELM Library: An LLM Evaluation Toolset</title><link>https://www.sei.cmu.edu/blog/the-elm-library-an-llm-evaluation-toolset/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>To help teams meet the need for rigorous evaluation methods, researchers in SEI’s AI Division developed a library built on best practices for LLM evaluation and benchmarking.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Violet Turri, Natalie Schieber, Charles Loughin, Tyler Brooks</dc:creator><pubDate>Wed, 06 May 2026 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-elm-library-an-llm-evaluation-toolset/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Data Poisoning in AI Models: The Case for Chain of Custody Controls</title><link>https://www.sei.cmu.edu/blog/data-poisoning-in-ai-models-the-case-for-chain-of-custody-controls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post explores data poisoning, which occurs when training data is modified to influence the performance of a model, and proposes cryptographic chain of custody as a mitigation.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renae Metcalf, Matt Churilla</dc:creator><pubDate>Mon, 27 Apr 2026 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/data-poisoning-in-ai-models-the-case-for-chain-of-custody-controls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Machine Learning</category><category>AISIRT</category></item><item><title>Using Data and Data Analytics to Improve Cyber Resilience</title><link>https://www.sei.cmu.edu/blog/using-data-and-data-analytics-to-improve-cyber-resilience/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Our post highlights the use of data analytics as a force multiplier for cyber resilience as well as best practices to help organizations gain situational awareness on their current security posture.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Patsy Bulisco</dc:creator><pubDate>Mon, 20 Apr 2026 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/using-data-and-data-analytics-to-improve-cyber-resilience/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>From Reality to Virtual Reality: The Impact of 3DGS on Training, Education, and Beyond</title><link>https://www.sei.cmu.edu/blog/from-reality-to-virtual-reality-the-impact-of-3dgs-on-training-education-and-beyond/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post describes cutting-edge method for creating digital models of the physical world called 3D Gaussian Splatting.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Roxxanne White, Matt Walsh, Dominic Ross, Richard Laughlin</dc:creator><pubDate>Wed, 25 Mar 2026 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/from-reality-to-virtual-reality-the-impact-of-3dgs-on-training-education-and-beyond/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Assessing the Feasibility and Advisability of a Civilian Cybersecurity Reserve</title><link>https://www.sei.cmu.edu/blog/assessing-the-feasibility-and-advisability-of-a-civilian-cybersecurity-reserve/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post highlights recent work by SEI researchers on behalf of the Department of War to assess the feasibility and advisability of a civilian cybersecurity reserve.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Marie Baker</dc:creator><pubDate>Tue, 10 Mar 2026 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/assessing-the-feasibility-and-advisability-of-a-civilian-cybersecurity-reserve/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>The Five Pillars of Software Assurance in System Acquisition</title><link>https://www.sei.cmu.edu/blog/the-five-pillars-of-software-assurance-in-system-acquisition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post presents five foundational capabilities to support the acquisition of a system with effective software assurance.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Carol Woody, Christopher Alberts, Michael Bandor, Timothy A. Chick</dc:creator><pubDate>Wed, 04 Mar 2026 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/the-five-pillars-of-software-assurance-in-system-acquisition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>An Approach to Accelerate Verification and Software Standards Testing with LLMs</title><link>https://www.sei.cmu.edu/blog/an-approach-to-accelerate-verification-and-software-standards-testing-with-llms/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post highlights the work of SEI researchers who sought to prove that LLMs can be used in unclassified environments to rapidly develop tools that could then be used to accelerate software analysis in classified environments.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ryan Karl, Yash Hindka, Shen Zhang, John Robert</dc:creator><pubDate>Mon, 09 Feb 2026 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/an-approach-to-accelerate-verification-and-software-standards-testing-with-llms/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>From Concept to Practice: How SSVC Has Evolved to Make Adoption Possible</title><link>https://www.sei.cmu.edu/blog/from-concept-to-practice-how-ssvc-has-evolved-to-make-adoption-possible/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post traces the milestones of the Stakeholder Specific Vulnerability Categorization and invites the community to participate, contribute, and benefit from the continued maturation of SSVC.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renae Metcalf, Allen Householder, Vijay Sarvepalli</dc:creator><pubDate>Wed, 28 Jan 2026 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/from-concept-to-practice-how-ssvc-has-evolved-to-make-adoption-possible/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>An Open Source Tool to Unravel UEFI and its Vulnerabilities</title><link>https://www.sei.cmu.edu/blog/an-open-source-tool-to-unravel-uefi-and-its-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post introduces CERT UEFI Parser, a new, open source tool that uses program analysis to reveal the architecture of UEFI software, and explore this veiled source of vulnerabilities.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vijay Sarvepalli, Renae Metcalf, Cory Cohen</dc:creator><pubDate>Thu, 22 Jan 2026 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/an-open-source-tool-to-unravel-uefi-and-its-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Upskilling the Federal Cybersecurity Workforce</title><link>https://www.sei.cmu.edu/blog/upskilling-the-federal-cybersecurity-workforce/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post details how the SEI Cyber Mission Readiness Team, in partnership with CISA, developed a series of Skilling Continuation Labs to provide unique, hands-on, immersive training to upskill the federal cybersecurity workforce.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Christopher Herr</dc:creator><pubDate>Tue, 20 Jan 2026 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/upskilling-the-federal-cybersecurity-workforce/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>The Top 10 Blog Posts of 2025</title><link>https://www.sei.cmu.edu/blog/the-top-10-blog-posts-of-2025/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Every January on the SEI Blog, we present the 10 most-visited posts from the previous year.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Thomas Longstaff</dc:creator><pubDate>Mon, 12 Jan 2026 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/the-top-10-blog-posts-of-2025/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Analyzing Partially Encrypted Network Flows with Mid-Encryption</title><link>https://www.sei.cmu.edu/blog/analyzing-partially-encrypted-network-flows-with-mid-encryption/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Encrypted traffic has come to dominate network flows, which makes it difficult for traditional flow monitoring tools to maintain visibility. In this blog post we take a closer look at a new feature added to CERT’s Yet Another Flowmeter tool (YAF) to capture the attributes of encryption when it occurs after the start of the session. We call this mid-encryption.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Steven Ibarra, Mark Thomas</dc:creator><pubDate>Mon, 15 Dec 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/analyzing-partially-encrypted-network-flows-with-mid-encryption/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Tailoring 9 Zero Trust and Security Principles to Weapon Systems</title><link>https://www.sei.cmu.edu/blog/tailoring-9-zero-trust-and-security-principles-to-weapon-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Our latest post outlines how 9 zero trust and security principles might apply to weapon systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Christopher Alberts, Timothy Morrow, Rhonda Brown, Charles Wallen</dc:creator><pubDate>Tue, 09 Dec 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/tailoring-9-zero-trust-and-security-principles-to-weapon-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>AI-Powered Memory Safety with the Pointer Ownership Model</title><link>https://www.sei.cmu.edu/blog/ai-powered-memory-safety-with-the-pointer-ownership-model/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post highlights work to automate C Code Security with AI-Powered memory safety.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Svoboda, Lori Flynn</dc:creator><pubDate>Wed, 03 Dec 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/ai-powered-memory-safety-with-the-pointer-ownership-model/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>How to Align Security Requirements and Controls to Express System Threats</title><link>https://www.sei.cmu.edu/blog/how-to-align-security-requirements-and-controls-to-express-system-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post presents a method that combines information about security requirements, controls, and capabilities with analysis regarding cyber threats to enable more effective risk-guided system planning.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Elias Miller, Matthew Sisk</dc:creator><pubDate>Fri, 21 Nov 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/how-to-align-security-requirements-and-controls-to-express-system-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>From Hype to Adoption: Guiding Organizations in Their AI Journey</title><link>https://www.sei.cmu.edu/blog/from-hype-to-adoption-guiding-organizations-in-their-ai-journey/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>After a flurry of initial investments in artificial intelligence, including generative and agentic AI, many organizations are facing mixed results. The SEI is examining how organizations adopt AI and what methods they can use to measure and improve their adoption for long-term success.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ipek Ozkaya, Anita Carleton, Erin Harper, Natalie Schieber, Robert Edman</dc:creator><pubDate>Mon, 10 Nov 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/from-hype-to-adoption-guiding-organizations-in-their-ai-journey/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>A Model-Based Approach for Software Acquisition</title><link>https://www.sei.cmu.edu/blog/a-model-based-approach-for-software-acquisition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The Department of War (DoW) is undergoing a significant transformation in how it acquires and develops software systems. Central to this evolution is the shift from traditional document-based processes to model-centric methodologies.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Colin Dempsey, Jerome Hugues</dc:creator><pubDate>Mon, 03 Nov 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/a-model-based-approach-for-software-acquisition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Modeling Services with Model-Based Systems Engineering (MBSE)</title><link>https://www.sei.cmu.edu/blog/modeling-services-with-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post explores an approach to designing services using model-based systems engineering (MBSE) with OMG’s Unified Architecture Framework (UAF).</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko, Grigoriy Shevchenko</dc:creator><pubDate>Tue, 28 Oct 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/modeling-services-with-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Radio-Frequency Attacks: Securing the OSI Stack</title><link>https://www.sei.cmu.edu/blog/radio-frequency-attacks-securing-the-osi-stack/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post reviews common radio frequency attacks and investigates how software and cybersecurity play key roles in these exploitations.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Joseph McIlvenny</dc:creator><pubDate>Mon, 20 Oct 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/radio-frequency-attacks-securing-the-osi-stack/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>What’s New in SSVC: Build, Explore, and Evolve Your Decision Models</title><link>https://www.sei.cmu.edu/blog/whats-new-in-ssvc-build-explore-and-evolve-your-decision-models/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Recent updates to the Stakeholder-Specific Vulnerability Categorization (SSVC) framework help different stakeholders to prioritize vulnerabilities according to their distinct risk appetites.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bon Jin Koo, Renae Metcalf, Vijay Sarvepalli, Allen Householder</dc:creator><pubDate>Mon, 13 Oct 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/whats-new-in-ssvc-build-explore-and-evolve-your-decision-models/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item></channel></rss>