<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog</title><link>http://sei.cmu.edu/feeds/latest/</link><description>Updates on changes and additions to the SEI Blog.</description><atom:link href="http://sei.cmu.edu/blog/feeds/latest/rss/" rel="self"/><language>en-us</language><lastBuildDate>Wed, 04 Mar 2026 00:00:00 -0500</lastBuildDate><item><title>The Five Pillars of Software Assurance in System Acquisition</title><link>https://www.sei.cmu.edu/blog/the-five-pillars-of-software-assurance-in-system-acquisition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post presents five foundational capabilities to support the acquisition of a system with effective software assurance.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Carol Woody, Christopher Alberts, Michael Bandor, Timothy A. Chick</dc:creator><pubDate>Wed, 04 Mar 2026 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/the-five-pillars-of-software-assurance-in-system-acquisition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>An Approach to Accelerate Verification and Software Standards Testing with LLMs</title><link>https://www.sei.cmu.edu/blog/an-approach-to-accelerate-verification-and-software-standards-testing-with-llms/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post highlights the work of SEI researchers who sought to prove that LLMs can be used in unclassified environments to rapidly develop tools that could then be used to accelerate software analysis in classified environments.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ryan Karl, Yash Hindka, Shen Zhang, John Robert</dc:creator><pubDate>Mon, 09 Feb 2026 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/an-approach-to-accelerate-verification-and-software-standards-testing-with-llms/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>From Concept to Practice: How SSVC Has Evolved to Make Adoption Possible</title><link>https://www.sei.cmu.edu/blog/from-concept-to-practice-how-ssvc-has-evolved-to-make-adoption-possible/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post traces the milestones of the Stakeholder Specific Vulnerability Categorization and invites the community to participate, contribute, and benefit from the continued maturation of SSVC.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renae Metcalf, Allen Householder, Vijay Sarvepalli</dc:creator><pubDate>Wed, 28 Jan 2026 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/from-concept-to-practice-how-ssvc-has-evolved-to-make-adoption-possible/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>An Open Source Tool to Unravel UEFI and its Vulnerabilities</title><link>https://www.sei.cmu.edu/blog/an-open-source-tool-to-unravel-uefi-and-its-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post introduces CERT UEFI Parser, a new, open source tool that uses program analysis to reveal the architecture of UEFI software, and explore this veiled source of vulnerabilities.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vijay Sarvepalli, Renae Metcalf, Cory Cohen</dc:creator><pubDate>Thu, 22 Jan 2026 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/an-open-source-tool-to-unravel-uefi-and-its-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Upskilling the Federal Cybersecurity Workforce</title><link>https://www.sei.cmu.edu/blog/upskilling-the-federal-cybersecurity-workforce/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post details how the SEI Cyber Mission Readiness Team, in partnership with CISA, developed a series of Skilling Continuation Labs to provide unique, hands-on, immersive training to upskill the federal cybersecurity workforce.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Christopher Herr</dc:creator><pubDate>Tue, 20 Jan 2026 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/upskilling-the-federal-cybersecurity-workforce/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>The Top 10 Blog Posts of 2025</title><link>https://www.sei.cmu.edu/blog/the-top-10-blog-posts-of-2025/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Every January on the SEI Blog, we present the 10 most-visited posts from the previous year.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Thomas Longstaff</dc:creator><pubDate>Mon, 12 Jan 2026 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/the-top-10-blog-posts-of-2025/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Analyzing Partially Encrypted Network Flows with Mid-Encryption</title><link>https://www.sei.cmu.edu/blog/analyzing-partially-encrypted-network-flows-with-mid-encryption/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Encrypted traffic has come to dominate network flows, which makes it difficult for traditional flow monitoring tools to maintain visibility. In this blog post we take a closer look at a new feature added to CERT’s Yet Another Flowmeter tool (YAF) to capture the attributes of encryption when it occurs after the start of the session. We call this mid-encryption.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Steven Ibarra, Mark Thomas</dc:creator><pubDate>Mon, 15 Dec 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/analyzing-partially-encrypted-network-flows-with-mid-encryption/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Tailoring 9 Zero Trust and Security Principles to Weapon Systems</title><link>https://www.sei.cmu.edu/blog/tailoring-9-zero-trust-and-security-principles-to-weapon-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Our latest post outlines how 9 zero trust and security principles might apply to weapon systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Christopher Alberts, Timothy Morrow, Rhonda Brown, Charles Wallen</dc:creator><pubDate>Tue, 09 Dec 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/tailoring-9-zero-trust-and-security-principles-to-weapon-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>AI-Powered Memory Safety with the Pointer Ownership Model</title><link>https://www.sei.cmu.edu/blog/ai-powered-memory-safety-with-the-pointer-ownership-model/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post highlights work to automate C Code Security with AI-Powered memory safety.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Svoboda, Lori Flynn</dc:creator><pubDate>Wed, 03 Dec 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/ai-powered-memory-safety-with-the-pointer-ownership-model/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>How to Align Security Requirements and Controls to Express System Threats</title><link>https://www.sei.cmu.edu/blog/how-to-align-security-requirements-and-controls-to-express-system-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post presents a method that combines information about security requirements, controls, and capabilities with analysis regarding cyber threats to enable more effective risk-guided system planning.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Elias Miller, Matthew Sisk</dc:creator><pubDate>Fri, 21 Nov 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/how-to-align-security-requirements-and-controls-to-express-system-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>From Hype to Adoption: Guiding Organizations in Their AI Journey</title><link>https://www.sei.cmu.edu/blog/from-hype-to-adoption-guiding-organizations-in-their-ai-journey/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>After a flurry of initial investments in artificial intelligence, including generative and agentic AI, many organizations are facing mixed results. The SEI is examining how organizations adopt AI and what methods they can use to measure and improve their adoption for long-term success.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ipek Ozkaya, Anita Carleton, Erin Harper, Natalie Schieber, Robert Edman</dc:creator><pubDate>Mon, 10 Nov 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/from-hype-to-adoption-guiding-organizations-in-their-ai-journey/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>A Model-Based Approach for Software Acquisition</title><link>https://www.sei.cmu.edu/blog/a-model-based-approach-for-software-acquisition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The Department of War (DoW) is undergoing a significant transformation in how it acquires and develops software systems. Central to this evolution is the shift from traditional document-based processes to model-centric methodologies.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Colin Dempsey, Jerome Hugues</dc:creator><pubDate>Mon, 03 Nov 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/a-model-based-approach-for-software-acquisition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Modeling Services with Model-Based Systems Engineering (MBSE)</title><link>https://www.sei.cmu.edu/blog/modeling-services-with-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post explores an approach to designing services using model-based systems engineering (MBSE) with OMG’s Unified Architecture Framework (UAF).</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko, Grigoriy Shevchenko</dc:creator><pubDate>Tue, 28 Oct 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/modeling-services-with-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Radio-Frequency Attacks: Securing the OSI Stack</title><link>https://www.sei.cmu.edu/blog/radio-frequency-attacks-securing-the-osi-stack/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post reviews common radio frequency attacks and investigates how software and cybersecurity play key roles in these exploitations.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Joseph McIlvenny</dc:creator><pubDate>Mon, 20 Oct 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/radio-frequency-attacks-securing-the-osi-stack/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>What’s New in SSVC: Build, Explore, and Evolve Your Decision Models</title><link>https://www.sei.cmu.edu/blog/whats-new-in-ssvc-build-explore-and-evolve-your-decision-models/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Recent updates to the Stakeholder-Specific Vulnerability Categorization (SSVC) framework help different stakeholders to prioritize vulnerabilities according to their distinct risk appetites.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bon Jin Koo, Renae Metcalf, Vijay Sarvepalli, Allen Householder</dc:creator><pubDate>Mon, 13 Oct 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/whats-new-in-ssvc-build-explore-and-evolve-your-decision-models/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Enhancing Security with Cloud Flow Logs</title><link>https://www.sei.cmu.edu/blog/enhancing-security-with-cloud-flow-logs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The SEI has a history of support for flow log analysis, including its 2025 releases (for Azure or AWS) of open-source scripts to facilitate cloud flow log analysis. This blog explores challenges with correlating events across multiple CSPs.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timothy Shimeall</dc:creator><pubDate>Mon, 06 Oct 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/enhancing-security-with-cloud-flow-logs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>5 Essential Questions for Implementing the Software Acquisition Pathway and the Tools to Tackle Them</title><link>https://www.sei.cmu.edu/blog/five-essential-questions-for-implementing-the-software-acquisition-pathway/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post outlines 5 essential questions to ask before implementing the Software Acquisition Pathway (SWP) and an SEI toolset to assist in the effort.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eileen Wrubel, Rita Creel, Brigid O'Hearn</dc:creator><pubDate>Tue, 23 Sep 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/five-essential-questions-for-implementing-the-software-acquisition-pathway/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Engineering Research and Development</category></item><item><title>A Call to Action: Building a Foundation for Model-Based Systems Engineering in Digital Engineering</title><link>https://www.sei.cmu.edu/blog/a-call-to-action-building-a-foundation-for-model-based-systems-engineering-in-digital-engineering/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The SEI brought together stakeholders who have been engaging and actively innovating in the dynamic environment of digital engineering. This blog post highlights calls to action for future work in MBSE and digital engineering from practitioners in the field.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Peter Capell, William Hayes, Jerome Hugues, Nataliya Shevchenko</dc:creator><pubDate>Mon, 15 Sep 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/a-call-to-action-building-a-foundation-for-model-based-systems-engineering-in-digital-engineering/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>My AI System Works…But Is It Safe to Use?</title><link>https://www.sei.cmu.edu/blog/my-ai-system-worksbut-is-it-safe-to-use/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post introduce System Theoretic Process Analysis (STPA), a hazard analysis technique uniquely suitable for dealing with the complexity of AI systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Schulker, Matt Walsh, Emil Mathew</dc:creator><pubDate>Tue, 09 Sep 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/my-ai-system-worksbut-is-it-safe-to-use/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>7 Recommendations to Improve SBOM Quality</title><link>https://www.sei.cmu.edu/blog/7-recommendations-to-improve-sbom-quality/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>There is growing interest in using SBOMs to support software supply chain risk management. This post recommends seven ways to improve SBOM accuracy.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Tobar, Jessie Jamieson, Mark Priest, Jason Fricke</dc:creator><pubDate>Mon, 25 Aug 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/7-recommendations-to-improve-sbom-quality/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item></channel></rss>