<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Best Practices</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Best Practices</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/best-practices/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 19 Jun 2023 00:00:00 -0400</lastBuildDate><item><title>What’s Going On in My Program? 12 Rules for Conducting Assessments</title><link>https://www.sei.cmu.edu/blog/whats-going-on-in-my-program-12-rules-for-conducting-assessments/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post provides 12 rules for successful program or project assessments.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Novak</dc:creator><pubDate>Mon, 19 Jun 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/whats-going-on-in-my-program-12-rules-for-conducting-assessments/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Cost Estimates</category><category>Software Sustainment</category><category>Acquisition Transformation</category><category>Measurement and Analysis</category><category>Best Practices</category><category>Software Quality</category></item><item><title>System End-of-Life Planning: Designing Systems for Maximum Resiliency Over Time</title><link>https://www.sei.cmu.edu/blog/system-end-of-life-planning-designing-systems-for-maximum-resiliency-over-time/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Deployment plans for computing environments must account for hardware replacements and decommissions even though such activities may not occur until years later.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Grant Deffenbaugh, Lyndsi Hughes</dc:creator><pubDate>Mon, 27 Sep 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/system-end-of-life-planning-designing-systems-for-maximum-resiliency-over-time/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Enterprise Risk and Resilience Management</category><category>Best Practices</category><category>Systems Engineering</category></item><item><title>Operator-Feedback Sessions in a Government Setting: The Good and Not-So-Good Parts</title><link>https://www.sei.cmu.edu/blog/operator-feedback-sessions-in-a-government-setting-the-good-and-not-so-good-parts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post covers good and not-so-good practices and outcomes in operator-feedback sessions in government environments.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Michael Szegedy, Timothy A. Chick</dc:creator><pubDate>Mon, 26 Jul 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/operator-feedback-sessions-in-a-government-setting-the-good-and-not-so-good-parts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Continuous Deployment of Capability</category><category>Requirements</category><category>User-Experience</category><category>Human-Computer Interaction</category><category>Usability</category><category>Best Practices</category><category>Agile Adoption in Government</category><category>Software Quality</category></item><item><title>Considerations for Operator-Feedback Sessions in Government Settings</title><link>https://www.sei.cmu.edu/blog/considerations-for-operator-feedback-sessions-in-government-settings/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post describes a design approach that considers operator feedback and effectively leverages feedback sessions.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Michael Szegedy, Timothy A. Chick</dc:creator><pubDate>Mon, 28 Jun 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/considerations-for-operator-feedback-sessions-in-government-settings/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Best Practices</category><category>Agile Adoption in Government</category><category>Software Quality</category><category>Requirements</category><category>User-Experience</category><category>Human-Computer Interaction</category><category>Usability</category><category>Continuous Deployment of Capability</category></item><item><title>Potential Implications of the California Consumer Privacy Act (CCPA) for Insider Risk Programs</title><link>https://www.sei.cmu.edu/blog/potential-implications-of-the-california-consumer-privacy-act-ccpa-for-insider-risk-programs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post reviews the general framework of the California Consumer Privacy Act (CCPA), describes specific implications for insider risk management, and provides recommendations to prepare insider risk programs to mitigate concerns before the CCPA takes effect.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emily Kessel, Sarah Miller, Carrie Gardner</dc:creator><pubDate>Mon, 31 May 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/potential-implications-of-the-california-consumer-privacy-act-ccpa-for-insider-risk-programs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Risk</category><category>Enterprise Risk and Resilience Management</category><category>Insider Threat</category><category>Best Practices</category></item><item><title>Mapping Cyber Hygiene to the NIST Cybersecurity Framework</title><link>https://www.sei.cmu.edu/blog/mapping-cyber-hygiene-to-the-nist-cybersecurity-framework/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In honor of Cybersecurity Awareness Month, I decided to put fingers to keys and share some basic practices that every organization should consider for their cyber hygiene initiatives....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Matthew Trevors</dc:creator><pubDate>Wed, 30 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/mapping-cyber-hygiene-to-the-nist-cybersecurity-framework/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Best Practices</category><category>Best Practices in Network Security</category></item><item><title>It's Time to Retire Your Unsupported Things</title><link>https://www.sei.cmu.edu/blog/its-time-to-retire-your-unsupported-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>"If it ain't broke, don't fix it." Why mess with something that already works? This is fair advice with many things in life. But when it comes to software security, it's important to....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Wed, 23 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/its-time-to-retire-your-unsupported-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>Update on the CERT Guide to Coordinated Vulnerability Disclosure</title><link>https://www.sei.cmu.edu/blog/update-on-the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>It's been two years since we originally published the CERT Guide to Coordinated Vulnerability Disclosure. In that time, it's influenced both the US Congress and EU Parliament....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Mon, 16 Sep 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/update-on-the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>Comments on Voluntary Voting System Guidelines 2.0 Principles and Guidelines</title><link>https://www.sei.cmu.edu/blog/comments-on-voluntary-voting-system-guidelines-20-principles-and-guidelines/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The U.S. Election Assistance Commission recently held a public comment period on their Voluntary Voting System Guidelines 2.0 Principles and Guidelines....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder, Deana Shick, Jonathan Spring, Art Manion</dc:creator><pubDate>Fri, 14 Jun 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/comments-on-voluntary-voting-system-guidelines-20-principles-and-guidelines/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Software and Information Assurance</category><category>Best Practices</category></item><item><title>A New Scientifically Supported Best Practice That Can Enhance Every Insider Threat Program!</title><link>https://www.sei.cmu.edu/blog/a-new-scientifically-supported-best-practice-that-can-enhance-every-insider-threat-program/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The CERT National Insider Threat Center (NITC) continues to transition its insider threat research to the public through its publications of the Common Sense Guide to Mitigating Insider Threats (CSG)....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Michael Theis, The CERT Insider Threat Center</dc:creator><pubDate>Tue, 09 Apr 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/a-new-scientifically-supported-best-practice-that-can-enhance-every-insider-threat-program/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Best Practices</category></item><item><title>Are You Providing Cybersecurity Awareness, Training, or Education?</title><link>https://www.sei.cmu.edu/blog/are-you-providing-cybersecurity-awareness-training-or-education/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>When I attend trainings, conferences, or briefings, I usually end up listening to someone reading slides about a problem. Rarely am I provided with any solutions or actions to remediate the problem....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mike Petock</dc:creator><pubDate>Wed, 20 Mar 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/are-you-providing-cybersecurity-awareness-training-or-education/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Insider Threat</category><category>Best Practices</category></item><item><title>When "ASLR" Is Not Really ASLR - The Case of Incorrect Assumptions and Bad Defaults</title><link>https://www.sei.cmu.edu/blog/when-aslr-is-not-really-aslr-the-case-of-incorrect-assumptions-and-bad-defaults/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>As a vulnerability analyst at the CERT Coordination Center, I am interested not only in software vulnerabilities themselves, but also exploits and exploit mitigations....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Fri, 03 Aug 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/when-aslr-is-not-really-aslr-the-case-of-incorrect-assumptions-and-bad-defaults/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>Insider Threat Supply Chain Best Practices</title><link>https://www.sei.cmu.edu/blog/insider-threat-supply-chain-best-practices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post outlines best practices for establishing an appropriate level of control to mitigate the risks involved in working with outside entities that support your organization's mission....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jean Handy</dc:creator><pubDate>Thu, 10 May 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/insider-threat-supply-chain-best-practices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Insider Threat</category><category>Best Practices</category><category>Best Practices in Network Security</category></item><item><title>Automatically Stealing Password Hashes with Microsoft Outlook and OLE</title><link>https://www.sei.cmu.edu/blog/automatically-stealing-password-hashes-with-microsoft-outlook-and-ole/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Back in 2016, a coworker of mine was using CERT BFF, and he asked how he could turn a seemingly exploitable crash in Microsoft Office into a proof-of-concept exploit that runs calc.exe....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Tue, 10 Apr 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/automatically-stealing-password-hashes-with-microsoft-outlook-and-ole/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>The CERT Guide to Coordinated Vulnerability Disclosure</title><link>https://www.sei.cmu.edu/blog/the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover the recently released CERT Guide to Coordinated Vulnerability Disclosure in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Tue, 15 Aug 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category><category>Cyber Missions</category><category>Best Practices</category></item><item><title>The Consequences of Insecure Software Updates</title><link>https://www.sei.cmu.edu/blog/the-consequences-of-insecure-software-updates/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this blog post, I discuss the impact of insecure software updates as well as several related topics, including mistakes made by software vendors in their update mechanisms, how to verify the security of a software update, and how vendors can implement secure software updating mechanisms.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Fri, 30 Jun 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-consequences-of-insecure-software-updates/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>The Twisty Maze of Getting Microsoft Office Updates</title><link>https://www.sei.cmu.edu/blog/the-twisty-maze-of-getting-microsoft-office-updates/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores the complexities and challenges of managing Microsoft Office updates and provides insights into installation best practices.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Thu, 13 Apr 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-twisty-maze-of-getting-microsoft-office-updates/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>Moving Beyond Resilience to Prosilience</title><link>https://www.sei.cmu.edu/blog/moving-beyond-resilience-to-prosilience/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn about the prosilience concept for preparing and responding to cyber incidents, in addition to its benefits in improving risk management in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Summer Fowler</dc:creator><pubDate>Mon, 27 Feb 2017 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/moving-beyond-resilience-to-prosilience/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Best Practices</category></item><item><title>CVD Series: Principles of Coordinated Vulnerability Disclosure (Part 2 of 9)</title><link>https://www.sei.cmu.edu/blog/cvd-series-principles-of-coordinated-vulnerability-disclosure-part-2-of-9/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog, the second in a nine-part series, explores Coordinated Vulnerability Disclosure (CVD) best practices for vulnerability disclosure.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Garret Wassermann</dc:creator><pubDate>Tue, 04 Oct 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/cvd-series-principles-of-coordinated-vulnerability-disclosure-part-2-of-9/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>CVD Series: What is Coordinated Vulnerability Disclosure? (Part 1 of 9)</title><link>https://www.sei.cmu.edu/blog/cvd-series-what-is-coordinated-vulnerability-disclosure-part-1-of-9/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This is the first post in a series about Coordinated Vulnerability Disclosure (CVD). In this series, we will discuss why CVD is an important part of the modern software development lifecycle, and how individuals and organizations can establish a CVD process.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Garret Wassermann</dc:creator><pubDate>Tue, 27 Sep 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/cvd-series-what-is-coordinated-vulnerability-disclosure-part-1-of-9/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>CERT/CC Vulnerabilities</category><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Best Practices</category></item></channel></rss>