<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Cybersecurity</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Cybersecurity</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/cybersecurity/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 16 Jun 2025 00:00:00 -0400</lastBuildDate><item><title>Radio Frequency 101: Can You Really Hack a Radio Signal?</title><link>https://www.sei.cmu.edu/blog/radio-frequency-101-can-you-really-hack-a-radio-signal/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Recent reports indicate the DoD is susceptible to radio frequency (RF) attacks. This post discusses common RF tools and ways malicious actors can attack systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Roxxanne White, Michael Bragg</dc:creator><pubDate>Mon, 16 Jun 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/radio-frequency-101-can-you-really-hack-a-radio-signal/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Internet of Things</category></item><item><title>The Essential Role of AISIRT in Flaw and Vulnerability Management</title><link>https://www.sei.cmu.edu/blog/the-essential-role-of-aisirt-in-flaw-and-vulnerability-management/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The SEI established the first Artificial Intelligence Security Incident Response Team (AISIRT) in 2023. This post discusses the role of AISIRT in coordinating flaws and vulnerabilities in AI systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lauren McIlvenny, Vijay Sarvepalli</dc:creator><pubDate>Wed, 26 Mar 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-essential-role-of-aisirt-in-flaw-and-vulnerability-management/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>CERT/CC Vulnerabilities</category><category>Cybersecurity</category><category>AISIRT</category></item><item><title>Cyber-Informed Machine Learning</title><link>https://www.sei.cmu.edu/blog/cyber-informed-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post proposes cyber-informed machine learning as a conceptual framework for emphasizing three types of explainability when ML is used for cybersecurity.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeffrey Mellon, Clarence Worrell</dc:creator><pubDate>Mon, 10 Feb 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/cyber-informed-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Machine Learning</category><category>Cybersecurity Engineering</category><category>AI Engineering and Machine Learning</category></item><item><title>3 Activities for Making Software Secure by Design</title><link>https://www.sei.cmu.edu/blog/3-activities-for-making-software-secure-by-design/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Understanding key principles, roadblocks, and accelerators can shift the secure software development paradigm.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Carol Woody, Robert Schiela</dc:creator><pubDate>Tue, 05 Sep 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/3-activities-for-making-software-secure-by-design/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Development</category><category>Cybersecurity</category></item><item><title>Using Game Theory to Advance the Quest for Autonomous Cyber Threat Hunting</title><link>https://www.sei.cmu.edu/blog/Using-Game-Theory-to-Advance-Cyber-Threat-Hunting/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post describes an effort to apply game theory to the development of algorithms suitable for informing a fully autonomous threat hunting capability and introduces the concept of chain games, a set of games in which threat hunting strategies can be evaluated and refined.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Phil Groce</dc:creator><pubDate>Mon, 24 Jul 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/Using-Game-Theory-to-Advance-Cyber-Threat-Hunting/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category></item><item><title>Process and Technical Vulnerabilities: 6 Key Takeaways from a Chemical Plant Disaster</title><link>https://www.sei.cmu.edu/blog/process-and-technical-vulnerabilities-6-key-takeaways-from-a-chemical-plant-disaster/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Weak processes can be as risky as technical vulnerabilities. This post describes how both of them worsened a cyber attack on a chemical plant.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Daniel Kambic</dc:creator><pubDate>Mon, 08 May 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/process-and-technical-vulnerabilities-6-key-takeaways-from-a-chemical-plant-disaster/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Risk and Resilience Management</category><category>Operational Resilience</category><category>Resilience Management Model (RMM)</category><category>Cybersecurity</category><category>Cybersecurity Controls</category><category>Enterprise Risk and Resilience Management</category><category>Best Practices in Network Security</category><category>Critical Infrastructure Protection</category></item><item><title>Designing Great Challenges for Cybersecurity Competitions</title><link>https://www.sei.cmu.edu/blog/designing-great-challenges-for-cybersecurity-competitions/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post highlights the SEI’s experience developing cybersecurity challenges for the President’s Cup Cybersecurity Competition and general-purpose guidelines and best practices for developing effective challenges.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jarrett Booz, Josh Hammerstein, Matt Kaar</dc:creator><pubDate>Mon, 17 Apr 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/designing-great-challenges-for-cybersecurity-competitions/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Cyber Workforce Development</category></item><item><title>The Benefits of Cyber Assessment Training</title><link>https://www.sei.cmu.edu/blog/the-benefits-of-cyber-assessment-training/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post discusses how cybersecurity assessments can help critical infrastructure organizations improve their cybersecurity with help from free assessment tools developed by the SEI and offered by the U.S. government.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rhonda Brown, Alexander Petrilli</dc:creator><pubDate>Mon, 13 Mar 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-benefits-of-cyber-assessment-training/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity Engineering</category><category>Cyber Risk and Resilience Management</category><category>Cybersecurity</category><category>Cyber Workforce Development</category></item><item><title>2 Approaches to Risk and Resilience: Asset-Based and Service-Based</title><link>https://www.sei.cmu.edu/blog/2-approaches-to-risk-and-resilience-asset-based-and-service-based/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>There are benefits and challenges of the two approaches to risk and resilience management: one based on an organization’s assets and the other on its services.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emily Shawgo</dc:creator><pubDate>Mon, 06 Feb 2023 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/2-approaches-to-risk-and-resilience-asset-based-and-service-based/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Risk and Resilience Management</category><category>Operational Resilience</category><category>Resilience Management Model (RMM)</category><category>Cybersecurity</category><category>Enterprise Risk and Resilience Management</category><category>Risk</category><category>Critical Infrastructure Protection</category></item><item><title>Six Dimensions of Trust in Autonomous Systems</title><link>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post chronicles the adoption and growth of autonomous systems and provides six considerations for establishing trust.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Paul Nielsen</dc:creator><pubDate>Wed, 20 Apr 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Software Assurance</category><category>Vulnerability Discovery</category><category>Devops</category><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Cybersecurity</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>Human-Machine Interactions</category><category>Artificial Intelligence</category><category>Digital Engineering</category><category>Cyber-Physical Systems</category></item><item><title>Using Machine Learning to Increase the Fidelity of Non-Player Characters in Training Simulations</title><link>https://www.sei.cmu.edu/blog/using-machine-learning-to-increase-the-fidelity-of-non-player-characters-in-training-simulations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Use of machine-learning (ML) modeling and a suite of software tools to create decision-making preferences that make non-player characters (NPCs) more realistic in simulations.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dustin Updyke, Thomas Podnar, Geoffrey Dobson, John Yarger</dc:creator><pubDate>Mon, 11 Apr 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/using-machine-learning-to-increase-the-fidelity-of-non-player-characters-in-training-simulations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Cyber Workforce Development</category></item><item><title>Translating the Risk Management Framework for Nonfederal Organizations</title><link>https://www.sei.cmu.edu/blog/translating-the-risk-management-framework-for-nonfederal-organizations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post translates federal-government-specific aspects of the Risk Management Framework into processes for nonfederal organizations.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Emily Shawgo, Brian Benestelli</dc:creator><pubDate>Mon, 23 Aug 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/translating-the-risk-management-framework-for-nonfederal-organizations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Risk and Resilience Management</category><category>Cybersecurity</category><category>Cybersecurity Controls</category><category>Enterprise Risk and Resilience Management</category><category>Risk</category></item><item><title>DNS Over HTTPS: 3 Strategies for Enterprise Security Monitoring</title><link>https://www.sei.cmu.edu/blog/dns-over-https-3-strategies-for-enterprise-security-monitoring/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>DNS over HTTPS (DoH) can impair enterprise network visibility and security by bypassing traditional DNS monitoring and protections. In this post, I'll provide enterprise defenders three strategies for security monitoring of DoH.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sean Hutchison</dc:creator><pubDate>Mon, 09 Aug 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/dns-over-https-3-strategies-for-enterprise-security-monitoring/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Traffic Analysis </category><category>Cybersecurity Engineering</category><category>Cybersecurity</category><category>Best Practices in Network Security</category></item><item><title>Generating Realistic Non-Player Characters for Training Cyberteams</title><link>https://www.sei.cmu.edu/blog/generating-realistic-non-player-characters-for-training-cyberteams/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post describes efforts underway to improve the realism of non-player characters (NPCs) in training exercises with new software called ANIMATOR.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dustin Updyke, Tyler Brooks</dc:creator><pubDate>Mon, 12 Apr 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/generating-realistic-non-player-characters-for-training-cyberteams/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Cyber Workforce Development</category></item><item><title>Six Key Cybersecurity Engineering Activities for Building a Cybersecurity Strategy</title><link>https://www.sei.cmu.edu/blog/six-key-cybersecurity-engineering-activities-for-building-a-cybersecurity-strategy/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post highlights the importance of cybersecurity strategy in designing and integrating technology for mission success under attack.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Carol Woody, Rita Creel</dc:creator><pubDate>Mon, 01 Feb 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/six-key-cybersecurity-engineering-activities-for-building-a-cybersecurity-strategy/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category></item><item><title>Cat and Mouse in the Age of .NET</title><link>https://www.sei.cmu.edu/blog/cat-and-mouse-age-net/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores evolving .NET threat landscape with challenges faced by red and blue teams and suggests ways to stay ahead of attackers.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brandon Marzik</dc:creator><pubDate>Thu, 19 Nov 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/cat-and-mouse-age-net/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Cybersecurity</category><category>Best Practices in Network Security</category></item><item><title>How to Protect Your High Value Assets</title><link>https://www.sei.cmu.edu/blog/how-to-protect-your-high-value-assets/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post will outline the background of the federal High Value Asset (HVA) Program, explain the resources available to guide the securing of high value assets, and discuss ways to apply these resources to your own assets.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brian Benestelli, Emily Shawgo</dc:creator><pubDate>Mon, 26 Oct 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-to-protect-your-high-value-assets/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Best Practices in Network Security</category></item><item><title>Is Your Organization Using Cybersecurity Analysis Effectively?</title><link>https://www.sei.cmu.edu/blog/is-your-organization-using-cybersecurity-analysis-effectively/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores how organizations can effectively use cybersecurity analysis and discusses the importance of an effective incident response plan.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman</dc:creator><pubDate>Mon, 31 Aug 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/is-your-organization-using-cybersecurity-analysis-effectively/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Cybersecurity</category></item><item><title>Could Blockchain Improve the Cybersecurity of Supply Chains?</title><link>https://www.sei.cmu.edu/blog/could-blockchain-improve-the-cybersecurity-of-supply-chains/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>A September 2018 report to the President, Assessing and Strengthening the Manufacturing and Defense Industrial Base and Supply Chain Resiliency of the United States, raised concerns about cybersecurity....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eliezer Kanal</dc:creator><pubDate>Mon, 04 Nov 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/could-blockchain-improve-the-cybersecurity-of-supply-chains/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Blockchain</category><category>Cybersecurity</category><category>Best Practices in Network Security</category></item><item><title>Six Free Tools for Creating a Cyber Simulator</title><link>https://www.sei.cmu.edu/blog/six-free-tools-for-creating-a-cyber-simulator/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>It can be hard for developers of cybersecurity training to create realistic simulations and training exercises when trainees are operating in closed (often classified) environments with no ability to connect to the Internet....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Joseph Mayes</dc:creator><pubDate>Mon, 15 Apr 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/six-free-tools-for-creating-a-cyber-simulator/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Cyber Missions</category><category>Best Practices in Network Security</category></item></channel></rss>