Call for Participation Now Open
Submit abstracts now for presentations, posters, and demonstrations related to the FloCon 2017 theme, “Flow and Beyond.” Deadline is Sept. 5.
SEI Introduces “Cyber Minute” Series
Video Briefs Highlight the Latest in SEI Work, Thought, and Resources
SEI Helps Government Contractors Ramp Up to Meet New NISPOM Mandate
NISPOM Change 2 Insider Threat Rules to Go Into Effect November 30, 2016
SEI Makes Updated CERT C Coding Standard Freely Available
New free, accessible, and easy-to-share edition offers important guidance on how to use C concurrency and specific examples on using the rules to avoid vulnerabilities such as Heartbleed.
SEI Hosts Cyber Lightning Exercise
Air National Guard and Air Force Reserve Units Learn and Test New Skills
10 At-Risk Emerging Technologies
CERT researchers identified 10 at-risk domains that impacted not only cybersecurity, but finance, personal health, and safety as well.
NEWS
-
SEI Introduces “Cyber Minute” Series
Article - 07/06/2016
CERT Division at a Glance
We were there for the first internet security incident and we’re still here 25 years later. Only now, we’ve expanded our expertise from incident response to a comprehensive, proactive approach to securing networked systems. The CERT Division is part of the Software Engineering Institute, which is based at Carnegie Mellon University. We are the world’s leading trusted authority dedicated to improving the security and resilience of computer systems and networks and are a national asset in the field of cybersecurity.
Learn More About the CERT Division:
RECENT VULNERABILITIES
-
VU#603047: Crestron AirMedia AM-100 contains multiple vulnerabilities
Original Release date - 08/01/2016 -
VU#974424: Crestron Electronics DM-TXRX-100-STR web interface contains multiple vulnerabilities
Original Release date - 08/01/2016 -
VU#217871: Intel CrossWalk project does not validate SSL certificates after first acceptance
Original Release date - 07/29/2016 - Report a Vulnerability
PUBLICATIONS
- CERT BFF: From Start to PoC This presentation describes the CERT Basic Fuzzing Framework (BFF) from start to PoC. Presentation - 06/09/2016
- Applying the Goal-Question-Indicator-Metric (GQIM) Method to Perform Military Situational Analysis This report describes how to use the goal-question-indicator-metric method in tandem with the military METT-TC method (mission, enemy, time, terrain, troops available, and civil-military considerations). Technical Note - 05/23/2016
- An Insider Threat Indicator Ontology This report presents an ontology for insider threat indicators, describes how the ontology was developed, and outlines the process by which it was validated. Technical Report - 05/10/2016
EVENTS
-
2016 CERT Secure Coding Symposium
At this free symposium, software development and assurance professionals will discuss challenges in secure coding practice adoption and software assurance.
Conferences - 09/08/2016 -
FloCon 2017
The FloCon network security conference provides a forum for large-scale network flow analytics.
Conferences - 01/09/2017
Blogs
Malicious Insiders in the Workplace Series: What Positions Do Malicious Insiders Hold? (Part 2 of 4)
08/02/2016 - Sarah MillerPodcasts
Global Value Chain – An Expanded View of the ICT Supply Chain
In this podcast, Edna Conway and John Haller discuss the global value chain for organizations and critical infrastructures and how this expanded view can be used to improve ICT supply chain management, including risks to the supply chain. Podcast - 07/18/2016

- Legal
- Terms of Use
- Privacy Statement
- Intellectual Property
Contact Us