<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | AISIRT</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching AISIRT</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/aisirt/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 27 Apr 2026 00:00:00 -0400</lastBuildDate><item><title>Data Poisoning in AI Models: The Case for Chain of Custody Controls</title><link>https://www.sei.cmu.edu/blog/data-poisoning-in-ai-models-the-case-for-chain-of-custody-controls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post explores data poisoning, which occurs when training data is modified to influence the performance of a model, and proposes cryptographic chain of custody as a mitigation.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renae Metcalf, Matt Churilla</dc:creator><pubDate>Mon, 27 Apr 2026 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/data-poisoning-in-ai-models-the-case-for-chain-of-custody-controls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Machine Learning</category><category>AISIRT</category></item><item><title>The Essential Role of AISIRT in Flaw and Vulnerability Management</title><link>https://www.sei.cmu.edu/blog/the-essential-role-of-aisirt-in-flaw-and-vulnerability-management/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The SEI established the first Artificial Intelligence Security Incident Response Team (AISIRT) in 2023. This post discusses the role of AISIRT in coordinating flaws and vulnerabilities in AI systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lauren McIlvenny, Vijay Sarvepalli</dc:creator><pubDate>Wed, 26 Mar 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-essential-role-of-aisirt-in-flaw-and-vulnerability-management/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>CERT/CC Vulnerabilities</category><category>Cybersecurity</category><category>AISIRT</category></item></channel></rss>