<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Software Assurance</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Software Assurance</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/software-assurance/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 24 Mar 2025 00:00:00 -0400</lastBuildDate><item><title>Enhancing Machine Learning Assurance with Portend</title><link>https://www.sei.cmu.edu/blog/enhancing-machine-learning-assurance-with-portend/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post introduces Portend, a new open source toolset that simulates data drift in machine learning models and identifies the proper metrics to detect drift in production environments.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeffrey Hansen, Sebastián Echeverría, Lena Pons, Gabriel Moreno, Grace Lewis, Lihan Zhan</dc:creator><pubDate>Mon, 24 Mar 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/enhancing-machine-learning-assurance-with-portend/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>Machine Learning</category></item><item><title>Challenges to Assuring Large-Scale Systems</title><link>https://www.sei.cmu.edu/blog/challenges-to-assuring-large-scale-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>National defense efforts have shifted from defeating terrorism to accelerating innovation, with a priority of delivering capability at speed and at scale.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Gabriel Moreno, Anton Hristozov, John Robert, Mark Klein</dc:creator><pubDate>Mon, 14 Oct 2024 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/challenges-to-assuring-large-scale-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category></item><item><title>Taking Up the Challenge of Open Source Software Security in the DoD</title><link>https://www.sei.cmu.edu/blog/taking-up-the-challenge-of-open-source-software-security-in-the-dod/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post describes a workshop hosted by the SEI to start a conversation to elevate the trustworthiness of free and open source software, particularly in DoD settings.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Scott Hissam</dc:creator><pubDate>Mon, 15 Aug 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/taking-up-the-challenge-of-open-source-software-security-in-the-dod/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>Supply Chains</category></item><item><title>Six Dimensions of Trust in Autonomous Systems</title><link>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post chronicles the adoption and growth of autonomous systems and provides six considerations for establishing trust.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Paul Nielsen</dc:creator><pubDate>Wed, 20 Apr 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Software Assurance</category><category>Vulnerability Discovery</category><category>Devops</category><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Cybersecurity</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>Human-Machine Interactions</category><category>Artificial Intelligence</category><category>Digital Engineering</category><category>Cyber-Physical Systems</category></item><item><title>Six Acquisition Pathways for Large-Scale, Complex Systems</title><link>https://www.sei.cmu.edu/blog/six-acquisition-pathways-for-large-scale-complex-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>How to map technical reference frameworks (TRFs) to the pathways that compose the DoD’s Adaptive Acquisition Framework (AAF)</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt, Nickolas Guertin</dc:creator><pubDate>Mon, 07 Feb 2022 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/six-acquisition-pathways-for-large-scale-complex-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>System of Systems</category><category>Open Systems Architectures</category><category>Achieving Modular Open System Architectures in DOD Acquisition</category><category>Acquisition Transformation</category></item><item><title>Toward Technical Reference Frameworks to Support Large-Scale Systems of Systems</title><link>https://www.sei.cmu.edu/blog/toward-technical-reference-frameworks-to-support-large-scale-systems-of-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Strategies for creating architectures for large-scale, complex, and interoperable systems of systems that are composed of functions covering a broad range of requirements.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nickolas Guertin, Douglas Schmidt</dc:creator><pubDate>Mon, 20 Dec 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/toward-technical-reference-frameworks-to-support-large-scale-systems-of-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>System of Systems</category><category>Open Systems Architectures</category><category>Achieving Modular Open System Architectures in DOD Acquisition</category><category>Acquisition Transformation</category></item><item><title>Safety Assurance Does Not Provide Software Assurance</title><link>https://www.sei.cmu.edu/blog/safety-assurance-does-not-provide-software-assurance/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog on cybersecurity in cyber-physical systems (CPS), shows how safety evaluations fail to protect against cyber threats.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mark Sherman</dc:creator><pubDate>Mon, 02 Aug 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/safety-assurance-does-not-provide-software-assurance/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category></item><item><title>Anti-Tamper for Software Components</title><link>https://www.sei.cmu.edu/blog/anti-tamper-for-software-components/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post explains how to identify software components within systems that are in danger of being exploited and that should be protected by anti-tamper practices.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Scott Hissam</dc:creator><pubDate>Mon, 21 Jun 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/anti-tamper-for-software-components/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>System Resilience</category><category>Cyber Risk and Resilience Management</category><category>Supply Chains</category></item><item><title>7 Quick Steps to Using Containers Securely</title><link>https://www.sei.cmu.edu/blog/7-quick-steps-to-using-containers-securely/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The use of containers in software development and deployment continues to trend upwards. There is good reason for this climb in usage as containers offer many benefits....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Scanlon, Richard Laughlin</dc:creator><pubDate>Mon, 06 Apr 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/7-quick-steps-to-using-containers-securely/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category></item><item><title>Data-Driven Management of Technical Debt</title><link>https://www.sei.cmu.edu/blog/data-driven-management-of-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn about the SEI's work on technical debt analysis techniques and practices to help software engineers manage its impact on projects in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ipek Ozkaya, Robert Nord</dc:creator><pubDate>Mon, 16 Dec 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/data-driven-management-of-technical-debt/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>Software Sustainment</category><category>Machine Learning</category><category>Software and Information Assurance</category><category>Static Analysis Classification and Prioritization</category><category>Artificial Intelligence</category><category>Software Architecture</category><category>Technical Debt</category><category>Software Quality</category></item><item><title>Automated Assurance of Security-Policy Enforcement In Critical Systems</title><link>https://www.sei.cmu.edu/blog/automated-assurance-of-security-policy-enforcement-in-critical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>As U.S. Department of Defense (DoD) mission-critical and safety-critical systems become increasingly connected, exposure from security infractions is likewise increasing....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Peter Feiler</dc:creator><pubDate>Mon, 19 Feb 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/automated-assurance-of-security-policy-enforcement-in-critical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category></item><item><title>Seven Principles for Software Assurance</title><link>https://www.sei.cmu.edu/blog/seven-principles-for-software-assurance/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post presents seven principles for achieving software assurance: stakeholder involvement, risk management, continuous monitoring, and more.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nancy Mead</dc:creator><pubDate>Mon, 24 Oct 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/seven-principles-for-software-assurance/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Software Assurance</category></item><item><title>Verifying Distributed Adaptive Real-Time Systems</title><link>https://www.sei.cmu.edu/blog/verifying-distributed-adaptive-real-time-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores high-assurance software in DART systems, and outlines the SEI's approach to meet safety requirements in dynamic environments.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">James Edmondson, Sagar Chaki</dc:creator><pubDate>Mon, 10 Oct 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/verifying-distributed-adaptive-real-time-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>Artificial Intelligence Engineering</category><category>Model Checking</category><category>Verification</category><category>Autonomy and Counter-Autonomy</category><category>Real-Time Scheduling</category><category>Artificial Intelligence</category><category>Cyber-Physical Systems</category></item><item><title>Addressing the Shortfall of Secure Software Developers through Community College Education</title><link>https://www.sei.cmu.edu/blog/addressing-the-shortfall-of-secure-software-developers-through-community-college-education/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog discusses a community college program created to address the industry's shortage of qualified professionals in secure software development.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nancy Mead</dc:creator><pubDate>Mon, 15 Aug 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/addressing-the-shortfall-of-secure-software-developers-through-community-college-education/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category></item><item><title>Using Quality Metrics and Security Methods to Predict Software Assurance</title><link>https://www.sei.cmu.edu/blog/using-quality-metrics-and-security-methods-to-predict-software-assurance/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Explore the Software Assurance Framework and discover promising software assurance methods in this informative SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Carol Woody, Nancy Mead</dc:creator><pubDate>Mon, 20 Jun 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/using-quality-metrics-and-security-methods-to-predict-software-assurance/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Software Assurance</category><category>Artificial Intelligence</category></item><item><title>Development of a Master of Software Assurance Reference Curriculum</title><link>https://www.sei.cmu.edu/blog/development-of-a-master-of-software-assurance-reference-curriculum/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn about the development of a Master of Software Assurance Reference Curriculum that can be adopted or customized by universities worldwide in this SEI Blog.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nancy Mead</dc:creator><pubDate>Mon, 21 Dec 2015 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/development-of-a-master-of-software-assurance-reference-curriculum/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category></item><item><title>Designing Security Into Software-Reliant Systems</title><link>https://www.sei.cmu.edu/blog/designing-security-into-software-reliant-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post highlights the SERA Framework, which was  developed to help organizations reduce operational security risks by proactively designing security controls into software-reliant systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Christopher Alberts</dc:creator><pubDate>Mon, 04 May 2015 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/designing-security-into-software-reliant-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category></item><item><title>Heartbleed and Goto Fail: Two Case Studies for Predicting Software Assurance Using Quality and Reliability Measures</title><link>https://www.sei.cmu.edu/blog/heartbleed-and-goto-fail-two-case-studies-for-predicting-software-assurance-using-quality-and-reliability-measures/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores the relationship between software quality, reliability, and security, and how addressing software defects can improve security.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Carol Woody, Bill Nichols</dc:creator><pubDate>Mon, 20 Apr 2015 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/heartbleed-and-goto-fail-two-case-studies-for-predicting-software-assurance-using-quality-and-reliability-measures/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Measurement and Analysis</category><category>Software Assurance</category></item><item><title>Resilience, Metrics, Sustainment, and Software Assurance - The Latest Research from the SEI</title><link>https://www.sei.cmu.edu/blog/resilience-metrics-sustainment-and-software-assurance-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover the SEI's latest research on resilience, metrics, sustainment, and software assurance.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 23 Feb 2015 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/resilience-metrics-sustainment-and-software-assurance-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>Resilience Management Model (RMM)</category></item><item><title>Software Assurance, Social Networking Tools, Insider Threat, and Risk Analysis--The Latest Research from the SEI</title><link>https://www.sei.cmu.edu/blog/software-assurance-social-networking-tools-insider-threat-and-risk-analysis-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover the latest work of SEI technologists in software assurance, social networking tools, insider threat, and more in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 19 Jan 2015 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/software-assurance-social-networking-tools-insider-threat-and-risk-analysis-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>Insider Threat</category></item></channel></rss>