<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Cybersecurity Engineering</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Cybersecurity Engineering</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/cybersecurity-engineering/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 10 Feb 2025 00:00:00 -0500</lastBuildDate><item><title>Cyber-Informed Machine Learning</title><link>https://www.sei.cmu.edu/blog/cyber-informed-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post proposes cyber-informed machine learning as a conceptual framework for emphasizing three types of explainability when ML is used for cybersecurity.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeffrey Mellon, Clarence Worrell</dc:creator><pubDate>Mon, 10 Feb 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/cyber-informed-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Machine Learning</category><category>Cybersecurity Engineering</category><category>AI Engineering and Machine Learning</category></item><item><title>The Benefits of Cyber Assessment Training</title><link>https://www.sei.cmu.edu/blog/the-benefits-of-cyber-assessment-training/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post discusses how cybersecurity assessments can help critical infrastructure organizations improve their cybersecurity with help from free assessment tools developed by the SEI and offered by the U.S. government.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rhonda Brown, Alexander Petrilli</dc:creator><pubDate>Mon, 13 Mar 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-benefits-of-cyber-assessment-training/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity Engineering</category><category>Cyber Risk and Resilience Management</category><category>Cybersecurity</category><category>Cyber Workforce Development</category></item><item><title>DNS Over HTTPS: 3 Strategies for Enterprise Security Monitoring</title><link>https://www.sei.cmu.edu/blog/dns-over-https-3-strategies-for-enterprise-security-monitoring/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>DNS over HTTPS (DoH) can impair enterprise network visibility and security by bypassing traditional DNS monitoring and protections. In this post, I'll provide enterprise defenders three strategies for security monitoring of DoH.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sean Hutchison</dc:creator><pubDate>Mon, 09 Aug 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/dns-over-https-3-strategies-for-enterprise-security-monitoring/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Traffic Analysis </category><category>Cybersecurity Engineering</category><category>Cybersecurity</category><category>Best Practices in Network Security</category></item><item><title>Zero Trust Adoption: Managing Risk with Cybersecurity Engineering and Adaptive Risk Assessment</title><link>https://www.sei.cmu.edu/blog/zero-trust-adoption-managing-risk-with-cybersecurity-engineering-and-adaptive-risk-assessment/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI blog post provides an overview of zero trust and management of its risk with SEI's cybersecurity engineering assessment framework.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Geoff Sanders</dc:creator><pubDate>Mon, 08 Mar 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/zero-trust-adoption-managing-risk-with-cybersecurity-engineering-and-adaptive-risk-assessment/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Risk</category><category>Cybersecurity Engineering</category></item></channel></rss>