<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Software and Information Assurance</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Software and Information Assurance</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/software-and-information-assurance/atom/" rel="self"/><language>en-us</language><lastBuildDate>Wed, 20 Apr 2022 00:00:00 -0400</lastBuildDate><item><title>Six Dimensions of Trust in Autonomous Systems</title><link>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post chronicles the adoption and growth of autonomous systems and provides six considerations for establishing trust.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Paul Nielsen</dc:creator><pubDate>Wed, 20 Apr 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Software Assurance</category><category>Vulnerability Discovery</category><category>Devops</category><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Cybersecurity</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>Human-Machine Interactions</category><category>Artificial Intelligence</category><category>Digital Engineering</category><category>Cyber-Physical Systems</category></item><item><title>Comments on NIST IR 8269: A Taxonomy and Terminology of Adversarial Machine Learning</title><link>https://www.sei.cmu.edu/blog/comments-on-nist-ir-8269-a-taxonomy-and-terminology-of-adversarial-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The U.S. National Institute of Standards and Technology (NIST) recently held a public comment period on their draft report on proposed taxonomy and terminology of Adversarial Machine Learning (AML)....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jonathan Spring</dc:creator><pubDate>Thu, 13 Feb 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/comments-on-nist-ir-8269-a-taxonomy-and-terminology-of-adversarial-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>System Verification and Validation</category><category>Mission Assurance</category></item><item><title>Data-Driven Management of Technical Debt</title><link>https://www.sei.cmu.edu/blog/data-driven-management-of-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn about the SEI's work on technical debt analysis techniques and practices to help software engineers manage its impact on projects in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ipek Ozkaya, Robert Nord</dc:creator><pubDate>Mon, 16 Dec 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/data-driven-management-of-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>Software Sustainment</category><category>Machine Learning</category><category>Software and Information Assurance</category><category>Static Analysis Classification and Prioritization</category><category>Artificial Intelligence</category><category>Software Architecture</category><category>Technical Debt</category><category>Software Quality</category></item><item><title>Prioritizing Vulnerability Response with a Stakeholder-Specific Vulnerability Categorization</title><link>https://www.sei.cmu.edu/blog/prioritizing-vulnerability-response-with-a-stakeholder-specific-vulnerability-categorization/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>We've just released a follow-up paper in our research agenda about prioritizing actions during vulnerability management, Prioritizing Vulnerability Response: A Stakeholder-Specific Vulnerability Categorization....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Thu, 05 Dec 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/prioritizing-vulnerability-response-with-a-stakeholder-specific-vulnerability-categorization/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Mitigation</category><category>CERT/CC</category><category>Software and Information Assurance</category></item><item><title>Machine Learning in Cybersecurity</title><link>https://www.sei.cmu.edu/blog/machine-learning-cybersecurity-2019/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Our technical report provides an overview of the relevant parts of an ML lifecycle--selecting the right problem, the right data, and the right math and summarizing the model output for consumption--as well as questions that relate to those areas of focus.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jonathan Spring</dc:creator><pubDate>Mon, 02 Dec 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/machine-learning-cybersecurity-2019/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Machine Learning</category><category>Cyber Missions</category></item><item><title>Cybersecurity Governance, Part 1: 5 Fundamental Challenges</title><link>https://www.sei.cmu.edu/blog/cybersecurity-governance-part-1-5-fundamental-challenges/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Most organizations have good enterprise-level security policies that define their approach to maintaining, improving, and securing their information and information systems....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Seth Swinton, Stephanie Hedges</dc:creator><pubDate>Thu, 25 Jul 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/cybersecurity-governance-part-1-5-fundamental-challenges/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Mission Assurance</category><category>Insider Threat</category></item><item><title>Selecting Measurement Data for Software Assurance Practices</title><link>https://www.sei.cmu.edu/blog/selecting-measurement-data-for-software-assurance-practices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Measuring the software assurance of a product as it is developed and delivered to function in a specific system context involves assembling carefully chosen metrics....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Carol Woody</dc:creator><pubDate>Mon, 08 Jul 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/selecting-measurement-data-for-software-assurance-practices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Measurement and Analysis</category></item><item><title>Comments on Voluntary Voting System Guidelines 2.0 Principles and Guidelines</title><link>https://www.sei.cmu.edu/blog/comments-on-voluntary-voting-system-guidelines-20-principles-and-guidelines/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The U.S. Election Assistance Commission recently held a public comment period on their Voluntary Voting System Guidelines 2.0 Principles and Guidelines....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder, Deana Shick, Jonathan Spring, Art Manion</dc:creator><pubDate>Fri, 14 Jun 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/comments-on-voluntary-voting-system-guidelines-20-principles-and-guidelines/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Software and Information Assurance</category><category>Best Practices</category></item><item><title>Operation Cloud Hopper Case Study</title><link>https://www.sei.cmu.edu/blog/operation-cloud-hopper-case-study/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In December, a grand jury indicted members of the APT10 group for a tactical campaign known as Operation Cloud Hopper, a global series of sustained attacks against managed service providers and, subsequently, their clients....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nathaniel Richmond</dc:creator><pubDate>Mon, 04 Mar 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/operation-cloud-hopper-case-study/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cloud Computing</category><category>Software and Information Assurance</category></item><item><title>Deep Learning, Agile-DevOps, and Cloud Security: The Top 10 Blog Posts of 2018</title><link>https://www.sei.cmu.edu/blog/deep-learning-agile-devops-and-cloud-security-the-top-10-blog-posts-of-2018/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Every January on the SEI Blog, we present the 10 most-visited posts of the previous year. This year's top 10, which features posts published between January 1, 2018, and December 31, 2018....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 07 Jan 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/deep-learning-agile-devops-and-cloud-security-the-top-10-blog-posts-of-2018/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Autonomy and Counter-Autonomy</category><category>Cloud Computing</category><category>Data Modeling and Analytics</category><category>Mission Assurance</category><category>Software and Information Assurance</category></item><item><title>Deploying the CERT Microcosm DevSecOps Pipeline using Docker-Compose and Kubernetes</title><link>https://www.sei.cmu.edu/blog/deploying-the-cert-microcosm-devsecops-pipeline-using-docker-compose-and-kubernetes/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>According to DevSecOps: Early, Everywhere, at Scale, a survey published by Sonatype, "Mature DevOps organizations are able to perform automated security analysis on each phase more often than non-DevOps organizations." ....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Shane Ficorilli</dc:creator><pubDate>Tue, 11 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/deploying-the-cert-microcosm-devsecops-pipeline-using-docker-compose-and-kubernetes/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Devops</category><category>Software and Information Assurance</category><category>Continuous Deployment of Capability</category></item><item><title>Rapid Software Composition by Assessing Untrusted Components</title><link>https://www.sei.cmu.edu/blog/rapid-software-composition-by-assessing-untrusted-components/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Today, organizations build applications on top of existing platforms, frameworks, components, and tools; no one constructs software from scratch....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rick Kazman</dc:creator><pubDate>Mon, 26 Nov 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/rapid-software-composition-by-assessing-untrusted-components/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Software Architecture</category><category>System Verification and Validation</category></item><item><title>An Analyst-Focused Approach to Network Traffic Analysis</title><link>https://www.sei.cmu.edu/blog/an-analyst-focused-approach-to-network-traffic-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Earlier this year, a team of researchers from the SEI CERT Division's Network Situational Awareness Team (CERT NetSA) released an update (3.17.0) to the System for....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Geoff Sanders</dc:creator><pubDate>Mon, 12 Nov 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/an-analyst-focused-approach-to-network-traffic-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Network Traffic Analysis </category></item><item><title>Improving Cybersecurity Governance via CSF Activity Clusters</title><link>https://www.sei.cmu.edu/blog/improving-cybersecurity-governance-via-csf-activity-clusters/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post presents SEI's work making Cybersecurity Framework (CSF) more accessible and provides example scenarios for effective cybersecurity decision-making.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Daniel Kambic</dc:creator><pubDate>Thu, 23 Aug 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/improving-cybersecurity-governance-via-csf-activity-clusters/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Mission Assurance</category><category>Insider Threat</category></item><item><title>Decision-Making Factors for Selecting Application Security Testing Tools</title><link>https://www.sei.cmu.edu/blog/decision-making-factors-for-selecting-application-security-testing-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In the first post in this series, I presented 10 types of application security testing (AST) tools and discussed when and how to use them....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Scanlon</dc:creator><pubDate>Mon, 20 Aug 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/decision-making-factors-for-selecting-application-security-testing-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Cybersecurity</category><category>Secure Coding</category><category>Security-Related Requirements</category><category>Software and Information Assurance</category><category>Testing</category><category>Vulnerability Analysis</category><category>Secure Development</category></item><item><title>10 Types of Application Security Testing Tools: When and How to Use Them</title><link>https://www.sei.cmu.edu/blog/10-types-of-application-security-testing-tools-when-and-how-to-use-them/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post categorizes different types of application security testing tools and provides guidance on how and when to use each class of tool.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Scanlon</dc:creator><pubDate>Mon, 09 Jul 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/10-types-of-application-security-testing-tools-when-and-how-to-use-them/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Testing</category><category>Cybersecurity</category><category>CERT/CC</category><category>Software and Information Assurance</category><category>Cyber Missions</category></item><item><title>Deep Learning, Cyber Intelligence, Managing Privacy and Security, and Network Traffic Analysis: The Latest Work from the SEI</title><link>https://www.sei.cmu.edu/blog/deep-learning-cyber-intelligence-managing-privacy-and-security-and-network-traffic-analysis-the-latest-work-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>As part of an ongoing effort to keep you informed about our latest work, this blog post summarizes some recently published SEI reports, podcasts, and presentations highlighting our work in deep learning, cyber intelligence, interruption costs....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 02 Jul 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/deep-learning-cyber-intelligence-managing-privacy-and-security-and-network-traffic-analysis-the-latest-work-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Mission Assurance</category></item><item><title>Infrastructure as Code: Moving Beyond DevOps and Agile</title><link>https://www.sei.cmu.edu/blog/infrastructure-as-code-moving-beyond-devops-and-agile/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Citing the need to provide a technical advantage to the warfighter, the Department of Defense (DoD) has recently made the adoption of cloud computing technologies a priority....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">John Klein</dc:creator><pubDate>Mon, 11 Jun 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/infrastructure-as-code-moving-beyond-devops-and-agile/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Devops</category><category>Cloud Computing</category><category>Software and Information Assurance</category><category>System Verification and Validation</category><category>Agile</category></item><item><title>Building Resilient Systems with Cybersecurity Controls Management</title><link>https://www.sei.cmu.edu/blog/building-resilient-systems-with-cybersecurity-controls-management/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The CERT Division of the SEI has evaluated the cyber resilience of hundreds of organizations. We've seen that many organizations may not have formally established a controls management program....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Matthew Trevors</dc:creator><pubDate>Thu, 24 May 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/building-resilient-systems-with-cybersecurity-controls-management/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Insider Threat</category><category>Cybersecurity Controls</category></item><item><title>Analysis: System Architecture Virtual Integration Nets Significant Savings</title><link>https://www.sei.cmu.edu/blog/analysis-system-architecture-virtual-integration-nets-significant-savings/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The size of aerospace software, as measured in source lines of code (SLOC), has grown rapidly. Airbus and Boeing data show that SLOC have doubled every four years....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Peter Feiler</dc:creator><pubDate>Mon, 07 May 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/analysis-system-architecture-virtual-integration-nets-significant-savings/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Architecture Analysis and Design Language (AADL)</category><category>Software and Information Assurance</category><category>Software Architecture</category></item></channel></rss>