<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>SEI Blog | Cybersecurity Engineering</title><link href="http://sei.cmu.edu/feeds/topic/cybersecurity-engineering/atom/?utm_source=blog&amp;utm_medium=rss" rel="alternate"/><link href="http://sei.cmu.edu/feeds/topic/cybersecurity-engineering/atom/?utm_source=blog&amp;utm_medium=rss" rel="self"/><id>http://sei.cmu.edu/feeds/topic/cybersecurity-engineering/atom/?utm_source=blog&amp;utm_medium=rss</id><updated>2025-11-21T00:00:00-05:00</updated><subtitle>Updates on changes and additions to the                         SEI Blog for posts matching Cybersecurity Engineering</subtitle><entry><title>How to Align Security Requirements and Controls to Express System Threats</title><link href="https://www.sei.cmu.edu/blog/how-to-align-security-requirements-and-controls-to-express-system-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-11-21T00:00:00-05:00</published><updated>2025-11-21T00:00:00-05:00</updated><author><name>Elias Miller, Matthew Sisk</name></author><id>https://www.sei.cmu.edu/blog/how-to-align-security-requirements-and-controls-to-express-system-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post presents a method that combines information about security requirements, controls, and capabilities with analysis regarding cyber threats to enable more effective risk-guided system planning.</summary></entry><entry><title>Enhancing Security with Cloud Flow Logs</title><link href="https://www.sei.cmu.edu/blog/enhancing-security-with-cloud-flow-logs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-10-06T00:00:00-04:00</published><updated>2025-10-06T00:00:00-04:00</updated><author><name>Timothy Shimeall</name></author><id>https://www.sei.cmu.edu/blog/enhancing-security-with-cloud-flow-logs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The SEI has a history of support for flow log analysis, including its 2025 releases (for Azure or AWS) of open-source scripts to facilitate cloud flow log analysis. This blog explores challenges with correlating events across multiple CSPs.</summary></entry><entry><title>Stop Imagining Threats, Start Mitigating Them: A Practical Guide to Threat Modeling</title><link href="https://www.sei.cmu.edu/blog/stop-imagining-threats-start-mitigating-them-a-practical-guide-to-threat-modeling/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-05-15T00:00:00-04:00</published><updated>2025-05-15T00:00:00-04:00</updated><author><name>Alex Vesey</name></author><id>https://www.sei.cmu.edu/blog/stop-imagining-threats-start-mitigating-them-a-practical-guide-to-threat-modeling/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">When building a software-intensive system, a key part in creating a secure and robust solution is to develop a cyber threat model.</summary></entry><entry><title>Cyber-Informed Machine Learning</title><link href="https://www.sei.cmu.edu/blog/cyber-informed-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-02-10T00:00:00-05:00</published><updated>2025-02-10T00:00:00-05:00</updated><author><name>Jeffrey Mellon, Clarence Worrell</name></author><id>https://www.sei.cmu.edu/blog/cyber-informed-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post proposes cyber-informed machine learning as a conceptual framework for emphasizing three types of explainability when ML is used for cybersecurity.</summary><category term="Cybersecurity"/><category term="Machine Learning"/><category term="Cybersecurity Engineering"/><category term="AI Engineering and Machine Learning"/></entry><entry><title>13 Cybersecurity Predictions for 2025</title><link href="https://www.sei.cmu.edu/blog/13-cybersecurity-predictions-for-2025/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-01-21T00:00:00-05:00</published><updated>2025-01-21T00:00:00-05:00</updated><author><name>Gregory Touhill</name></author><id>https://www.sei.cmu.edu/blog/13-cybersecurity-predictions-for-2025/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">It’s that time of year when we reflect on the past year and eagerly look forward. This post presents 13 cyber predictions for 2025.</summary></entry><entry><title>An Introduction to Hardening Docker Images</title><link href="https://www.sei.cmu.edu/blog/an-introduction-to-hardening-docker-images/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-11-11T00:00:00-05:00</published><updated>2024-11-11T00:00:00-05:00</updated><author><name>Maxwell Trdina, Sasank Vishnubhatla</name></author><id>https://www.sei.cmu.edu/blog/an-introduction-to-hardening-docker-images/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Through our work, we have seen stakeholders encountering difficulty with hardening open source container images for vulnerability mitigation.</summary></entry><entry><title>A Framework for Detection in an Era of Rising Deepfakes</title><link href="https://www.sei.cmu.edu/blog/a-framework-for-detection-in-an-era-of-rising-deepfakes/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-10-28T00:00:00-04:00</published><updated>2024-10-28T00:00:00-04:00</updated><author><name>Matt Walsh</name></author><id>https://www.sei.cmu.edu/blog/a-framework-for-detection-in-an-era-of-rising-deepfakes/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post details the evolving deepfake landscape and introduces a framework for detection.</summary></entry><entry><title>Evaluating Static Analysis Alerts with LLMs</title><link href="https://www.sei.cmu.edu/blog/evaluating-static-analysis-alerts-with-llms/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-10-07T00:00:00-04:00</published><updated>2024-10-07T00:00:00-04:00</updated><author><name>William Klieber, Lori Flynn</name></author><id>https://www.sei.cmu.edu/blog/evaluating-static-analysis-alerts-with-llms/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">LLMs show promising initial results in adjudicating static analysis alerts, offering possibilities for better vulnerability detection. This post discusses initial experiments using GPT-4 to evaluate static analysis alerts.</summary><category term="Static Analysis"/><category term="AI Engineering and Machine Learning"/><category term="Secure Coding"/></entry><entry><title>3 API Security Risks and Recommendations for Mitigation</title><link href="https://www.sei.cmu.edu/blog/3-api-security-risks-and-recommendations-for-mitigation/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-07-15T00:00:00-04:00</published><updated>2024-07-15T00:00:00-04:00</updated><author><name>McKinley Sconiers-Hasan</name></author><id>https://www.sei.cmu.edu/blog/3-api-security-risks-and-recommendations-for-mitigation/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post presents three top API security risks along with recommendations for mitigating them.</summary></entry><entry><title>Redemption: A Prototype for Automated Repair of Static Analysis Alerts</title><link href="https://www.sei.cmu.edu/blog/redemption-a-prototype-for-automated-repair-of-static-analysis-alerts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-06-10T00:00:00-04:00</published><updated>2024-06-10T00:00:00-04:00</updated><author><name>David Svoboda</name></author><id>https://www.sei.cmu.edu/blog/redemption-a-prototype-for-automated-repair-of-static-analysis-alerts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post introduces Redemption, an open source tool that uses automated code repair technology to repair static analysis alerts in C/C++ source code.</summary><category term="Secure Coding"/><category term="Testing"/><category term="Static Analysis"/></entry><entry><title>Versioning with Git Tags and Conventional Commits</title><link href="https://www.sei.cmu.edu/blog/versioning-with-git-tags-and-conventional-commits/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-05-29T00:00:00-04:00</published><updated>2024-05-29T00:00:00-04:00</updated><author><name>Alex Vesey</name></author><id>https://www.sei.cmu.edu/blog/versioning-with-git-tags-and-conventional-commits/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post explores extending the conventional commit paradigm to enable automatic semantic versioning with git tags to streamline the development and deployment of software.</summary></entry><entry><title>API Security through Contract-Driven Programming</title><link href="https://www.sei.cmu.edu/blog/api-security-through-contract-driven-programming/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-03-18T00:00:00-04:00</published><updated>2024-03-18T00:00:00-04:00</updated><author><name>Alex Vesey</name></author><id>https://www.sei.cmu.edu/blog/api-security-through-contract-driven-programming/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post explores contract programming and specifically how that applies to the building, maintenance, and security of APIs.</summary></entry><entry><title>Explainability in Cybersecurity Data Science</title><link href="https://www.sei.cmu.edu/blog/explainability-in-cybersecurity-data-science/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-11-20T00:00:00-05:00</published><updated>2023-11-20T00:00:00-05:00</updated><author><name>Jeffrey Mellon, Clarence Worrell</name></author><id>https://www.sei.cmu.edu/blog/explainability-in-cybersecurity-data-science/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post provides an overview of explainability in machine learning and includes illustrations of model-to-human and human-to-model explainability.</summary></entry><entry><title>Secure by Design at CERT</title><link href="https://www.sei.cmu.edu/blog/secure-by-design-at-cert/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-10-09T00:00:00-04:00</published><updated>2023-10-09T00:00:00-04:00</updated><author><name>Gregory Touhill</name></author><id>https://www.sei.cmu.edu/blog/secure-by-design-at-cert/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The national cybersecurity strategy calls on tech providers to ensure that all their products are secure by design and secure by default. This post highlights the SEI CERT Division's continued and longstanding efforts to ensure security by design in fielded software.</summary></entry><entry><title>3 Activities for Making Software Secure by Design</title><link href="https://www.sei.cmu.edu/blog/3-activities-for-making-software-secure-by-design/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-09-05T00:00:00-04:00</published><updated>2023-09-05T00:00:00-04:00</updated><author><name>Dr. Carol Woody, Robert Schiela</name></author><id>https://www.sei.cmu.edu/blog/3-activities-for-making-software-secure-by-design/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Understanding key principles, roadblocks, and accelerators can shift the secure software development paradigm.</summary><category term="Secure Development"/><category term="Cybersecurity"/></entry><entry><title>Using Game Theory to Advance the Quest for Autonomous Cyber Threat Hunting</title><link href="https://www.sei.cmu.edu/blog/Using-Game-Theory-to-Advance-Cyber-Threat-Hunting/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-07-24T00:00:00-04:00</published><updated>2023-07-24T00:00:00-04:00</updated><author><name>Phil Groce</name></author><id>https://www.sei.cmu.edu/blog/Using-Game-Theory-to-Advance-Cyber-Threat-Hunting/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post describes an effort to apply game theory to the development of algorithms suitable for informing a fully autonomous threat hunting capability and introduces the concept of chain games, a set of games in which threat hunting strategies can be evaluated and refined.</summary><category term="Cybersecurity"/></entry><entry><title>8 Areas of Future Research in Zero Trust</title><link href="https://www.sei.cmu.edu/blog/8-areas-of-future-research-in-zero-trust/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-04-24T00:00:00-04:00</published><updated>2023-04-24T00:00:00-04:00</updated><author><name>Matthew Nicolai, Trista Polaski, Timothy Morrow</name></author><id>https://www.sei.cmu.edu/blog/8-areas-of-future-research-in-zero-trust/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The National Cybersecurity Strategy was released on March 1st, 2023 to improve federal cybersecurity through the implementation of a zero trust architecture.</summary><category term="Zero Trust"/></entry><entry><title>Security Analytics: Using SiLK and Mothra to Identify Data Exfiltration via the Domain Name Service</title><link href="https://www.sei.cmu.edu/blog/security-analytics-using-silk-and-mothra-to-identify-data-exfiltration-via-the-domain-name-service/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-04-03T00:00:00-04:00</published><updated>2023-04-03T00:00:00-04:00</updated><author><name>Timothy Shimeall</name></author><id>https://www.sei.cmu.edu/blog/security-analytics-using-silk-and-mothra-to-identify-data-exfiltration-via-the-domain-name-service/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post explores how the DNS protocol can be abused to exfiltrate data by adding bytes of data onto DNS queries.</summary><category term="SOC Analytics"/></entry><entry><title>The Benefits of Cyber Assessment Training</title><link href="https://www.sei.cmu.edu/blog/the-benefits-of-cyber-assessment-training/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-03-13T00:00:00-04:00</published><updated>2023-03-13T00:00:00-04:00</updated><author><name>Rhonda Brown, Alexander Petrilli</name></author><id>https://www.sei.cmu.edu/blog/the-benefits-of-cyber-assessment-training/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post discusses how cybersecurity assessments can help critical infrastructure organizations improve their cybersecurity with help from free assessment tools developed by the SEI and offered by the U.S. government.</summary><category term="Cybersecurity Engineering"/><category term="Cyber Risk and Resilience Management"/><category term="Cybersecurity"/><category term="Cyber Workforce Development"/></entry><entry><title>5 Best Practices from Industry for Implementing a Zero Trust Architecture</title><link href="https://www.sei.cmu.edu/blog/5-best-practices-from-industry-for-implementing-a-zero-trust-architecture/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-03-06T00:00:00-05:00</published><updated>2023-03-06T00:00:00-05:00</updated><author><name>Matthew Nicolai, Nathaniel Richmond, Timothy Morrow</name></author><id>https://www.sei.cmu.edu/blog/5-best-practices-from-industry-for-implementing-a-zero-trust-architecture/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post presents 5 best practices from industry on implementing a zero trust architecture and discusses why they are significant.</summary><category term="Zero Trust"/></entry></feed>