<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Cyber Missions</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Cyber Missions</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/cyber-missions/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 02 Dec 2019 00:00:00 -0500</lastBuildDate><item><title>Machine Learning in Cybersecurity</title><link>https://www.sei.cmu.edu/blog/machine-learning-cybersecurity-2019/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Our technical report provides an overview of the relevant parts of an ML lifecycle--selecting the right problem, the right data, and the right math and summarizing the model output for consumption--as well as questions that relate to those areas of focus.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jonathan Spring</dc:creator><pubDate>Mon, 02 Dec 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/machine-learning-cybersecurity-2019/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Machine Learning</category><category>Cyber Missions</category></item><item><title>Managing the Risks of Ransomware</title><link>https://www.sei.cmu.edu/blog/managing-the-risks-of-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Ransomware poses a growing threat to both businesses and government agencies. Though no strategy can fully eliminate these risks, this post provides recommendations....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Tobar, Jason Fricke</dc:creator><pubDate>Fri, 11 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/managing-the-risks-of-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Cyber Missions</category><category>Best Practices in Network Security</category><category>Situational Awareness</category></item><item><title>Six Free Tools for Creating a Cyber Simulator</title><link>https://www.sei.cmu.edu/blog/six-free-tools-for-creating-a-cyber-simulator/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>It can be hard for developers of cybersecurity training to create realistic simulations and training exercises when trainees are operating in closed (often classified) environments with no ability to connect to the Internet....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Joseph Mayes</dc:creator><pubDate>Mon, 15 Apr 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/six-free-tools-for-creating-a-cyber-simulator/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Cyber Missions</category><category>Best Practices in Network Security</category></item><item><title>Business Email Compromise: Operation Wire Wire and New Attack Vectors</title><link>https://www.sei.cmu.edu/blog/business-email-compromise-operation-wire-wire-and-new-attack-vectors/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In June 2018, Federal authorities announced a significant coordinated effort to disrupt business email compromise (BEC) schemes that are designed to intercept and hijack wire transfers from businesses and individuals....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anne Connell</dc:creator><pubDate>Mon, 08 Apr 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/business-email-compromise-operation-wire-wire-and-new-attack-vectors/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category><category>Cyber Missions</category><category>Best Practices in Network Security</category><category>Social Engineering</category></item><item><title>How to Use Static Analysis to Enforce SEI CERT Coding Standards for IoT Applications</title><link>https://www.sei.cmu.edu/blog/how-to-use-static-analysis-to-enforce-sei-cert-coding-standards-for-iot-applications/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The Jeep hack, methods to hack ATMs, and even hacks to a casino's fish tank provide stark evidence of the risks associated with the Internet of Things (IoT)....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Svoboda</dc:creator><pubDate>Mon, 01 Apr 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-to-use-static-analysis-to-enforce-sei-cert-coding-standards-for-iot-applications/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security-Related Requirements</category><category>Secure Coding</category><category>Cyber Risk and Resilience Management</category><category>Static Analysis</category><category>Cybersecurity</category><category>Secure Development</category><category>Cyber Missions</category><category>Best Practices in Network Security</category></item><item><title>Securely Connecting Africa</title><link>https://www.sei.cmu.edu/blog/securely-connecting-africa/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>While the Internet has enabled modernization in parts of the developing world, it has also introduced new cybersecurity challenges....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vijay Sarvepalli</dc:creator><pubDate>Mon, 25 Mar 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/securely-connecting-africa/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>CSIRT</category><category>Cyber Missions</category><category>Cybersecurity Center Development</category></item><item><title>Using the SEI CERT Coding Standards to Improve Security of the Internet of Things</title><link>https://www.sei.cmu.edu/blog/using-the-sei-cert-coding-standards-to-improve-security-of-the-internet-of-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The Internet of Things (IoT) is insecure. The Jeep hack received a lot of publicity, and there are various ways to hack ATMs, with incidents occurring with increasing regularity....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Svoboda</dc:creator><pubDate>Mon, 11 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/using-the-sei-cert-coding-standards-to-improve-security-of-the-internet-of-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security-Related Requirements</category><category>Secure Coding</category><category>Secure Development</category><category>Cyber Missions</category><category>Internet of Things</category></item><item><title>Expectations for Implementing DevOps in a Highly Regulated Environment: Second in a Series</title><link>https://www.sei.cmu.edu/blog/expectations-for-implementing-devops-in-a-highly-regulated-environment-second-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This second installment in the blog post series on implementing DevOps in highly regulated environments (HREs), which is excerpted from a recently published paper, discusses the first step in a DevOps assessment....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">José Morales</dc:creator><pubDate>Fri, 08 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/expectations-for-implementing-devops-in-a-highly-regulated-environment-second-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Devops</category><category>Human-Machine Interactions</category><category>Mission Assurance</category><category>Continuous Deployment of Capability</category></item><item><title>Evaluating Threat-Modeling Methods for Cyber-Physical Systems</title><link>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 04 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Improving Assessments for Cybersecurity Training</title><link>https://www.sei.cmu.edu/blog/improving-assessments-for-cybersecurity-training/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The CERT Cyber Workforce Development Directorate conducts training in cyber operations for the DoD and other government customers as part of its commitment to strengthen the nation's cybersecurity workforce....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">April Galyardt</dc:creator><pubDate>Mon, 21 Jan 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/improving-assessments-for-cybersecurity-training/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Cybersecurity</category><category>Machine Learning</category><category>Artificial Intelligence Engineering</category></item><item><title>SCALe v. 3: Automated Classification and Advanced Prioritization of Static Analysis Alerts</title><link>https://www.sei.cmu.edu/blog/scale-v-3-automated-classification-and-advanced-prioritization-of-static-analysis-alerts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Static analysis tools analyze code without executing it, to identify potential flaws in source code. These tools produce a large number of alerts with high false-positive rates that an engineer must....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn, Ebonie McNeil</dc:creator><pubDate>Mon, 17 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/scale-v-3-automated-classification-and-advanced-prioritization-of-static-analysis-alerts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>SCALE: A Static Analysis Auditing Tool</category><category>Secure Coding</category><category>Static Analysis Classification and Prioritization</category><category>Secure Development</category><category>Cyber Missions</category></item><item><title>Path Finding in Malicious Binaries: First in a Series</title><link>https://www.sei.cmu.edu/blog/path-finding-in-malicious-binaries-first-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In a previous post, I discussed the Pharos Binary Analysis Framework and tools to support reverse engineering of binaries with a focus on malicious code analysis. Recall that Pharos is....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeff Gennari</dc:creator><pubDate>Mon, 10 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/path-finding-in-malicious-binaries-first-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Reverse Engineering for Malware Analysis</category><category>Malware Analysis</category><category>Cyber Missions</category><category>Malware</category></item><item><title>Threat Modeling: 12 Available Methods</title><link>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Almost all software systems today face a variety of threats, and the number of threats grows as technology changes....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 03 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>IPV6 Adoption:  Is your ISP ready to support IPv6?</title><link>https://www.sei.cmu.edu/blog/ipv6-adoption-is-your-isp-ready-to-support-ipv6/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post examines best practices for transitioning to IPv6 and presents points to help determine if your current ISP can support IPv6 ambitions.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Joseph Mayes</dc:creator><pubDate>Mon, 22 Oct 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/ipv6-adoption-is-your-isp-ready-to-support-ipv6/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>IPV6</category><category>Cyber Missions</category><category>Best Practices in Network Security</category></item><item><title>Best Practices in Network Traffic Analysis: Three Perspectives</title><link>https://www.sei.cmu.edu/blog/best-practices-in-network-traffic-analysis-three-perspectives/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In July of this year, a major overseas shipping company had its U.S. operations disrupted by a ransomware attack, one of the latest attacks to disrupt the daily operation of a major, multi-national organization....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman, Timothy Shimeall, Timur Snoke</dc:creator><pubDate>Mon, 08 Oct 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/best-practices-in-network-traffic-analysis-three-perspectives/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Human-Machine Interactions</category><category>Cyber Missions</category><category>Best Practices in Network Security</category></item><item><title>SCALe: A Tool for Managing Output from Static Analysis Tools</title><link>https://www.sei.cmu.edu/blog/scale-a-tool-for-managing-output-from-static-analysis-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Experience shows that most software contains code flaws that can lead to vulnerabilities. Static analysis tools used to identify potential vulnerabilities in source code produce....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lori Flynn</dc:creator><pubDate>Mon, 24 Sep 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/scale-a-tool-for-managing-output-from-static-analysis-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Secure Development</category><category>Static Analysis Classification and Prioritization</category><category>Cyber Missions</category><category>SCALE: A Static Analysis Auditing Tool</category></item><item><title>Engaging the CSIRT Community: Cyber Capacity Building on a Global Scale</title><link>https://www.sei.cmu.edu/blog/engaging-the-csirt-community-cyber-capacity-building-on-a-global-scale/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>At the 2018 World Economic Forum, global leaders voiced concerns about the growing trend of cyberattacks targeting critical infrastructure and strategic industrial sectors, citing fears of a worst-case scenario that could....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angel Hueca</dc:creator><pubDate>Mon, 10 Sep 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/engaging-the-csirt-community-cyber-capacity-building-on-a-global-scale/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>CSIRT</category><category>Cyber Missions</category><category>Cybersecurity Center Development</category></item><item><title>Decision-Making Factors for Selecting Application Security Testing Tools</title><link>https://www.sei.cmu.edu/blog/decision-making-factors-for-selecting-application-security-testing-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In the first post in this series, I presented 10 types of application security testing (AST) tools and discussed when and how to use them....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Scanlon</dc:creator><pubDate>Mon, 20 Aug 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/decision-making-factors-for-selecting-application-security-testing-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Cybersecurity</category><category>Secure Coding</category><category>Security-Related Requirements</category><category>Software and Information Assurance</category><category>Testing</category><category>Vulnerability Analysis</category><category>Secure Development</category></item><item><title>IPv6 Adoption: 4 Questions and Answers</title><link>https://www.sei.cmu.edu/blog/ipv6-adoption-4-questions-and-answers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>IPv6 deployment is on the rise. Google reported that as of July 14 2018, 23.94 percent of users accessed its site via IPv6, up 6.16 percent from that same date in 2017....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Joseph Mayes</dc:creator><pubDate>Mon, 13 Aug 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/ipv6-adoption-4-questions-and-answers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Best Practices in Network Security</category><category>Cyber Missions</category><category>Secure Coding</category><category>Security-Related Requirements</category><category>IPV6</category><category>Secure Development</category></item><item><title>Security Begins at the Home Router</title><link>https://www.sei.cmu.edu/blog/security-begins-at-the-home-router/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In recent days, the VPNFilter malware has attracted attention, much of it in the wake of a May 25 public service announcement from the FBI, as well as a number of announcements from vendors and security companies....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vijay Sarvepalli</dc:creator><pubDate>Mon, 30 Jul 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/security-begins-at-the-home-router/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Malware</category></item></channel></rss>