Publications
- 05/16/2017 SEI Cyber Minute: Enterprise Risk Management Watch Summer Fowler in this SEI Cyber Minute as she discusses "Enterprise Risk Management".
- 05/11/2017 Building Analytics for Network Flow Records Learn how to identify network flow characteristics and metrics that support understanding traffic
- 05/02/2017 Thinking about Intrusion Kill Chains as Mechanisms We integrate two established modeling methods from disparate fields: mechanisms from the philosophy of science literature and intrusion kill chain modeling from the computer security literature.
- 05/01/2017 Assessing DoD System Acquisition Supply Chain Risk Management In this Crosstalk article, the authors discuss the growing challenge of cyber risks in the defense supply chain.
- 04/19/2017 SEI Cyber Minute: Insider Threats Watch Randy Trzeciak in this SEI Cyber Minute as he discusses "Insider Threats".
- 04/06/2017 Prototype Software Assurance Framework (SAF): Introduction and Overview In this report, the authors discuss the Software Assurance Framework (SAF), a collection of cybersecurity practices that programs can apply across the acquisition lifecycle and supply chain.
- 04/06/2017 SEI Cyber Minute: Defending Against DDOS Attacks Watch Rachel Kartch in this SEI Cyber Minute as she discusses "Defending Against DDOS Attacks".
- 03/27/2017 Spring 2017 Edition of the Secure Coding Newsletter The team announces the release of the new C++ Coding Standard.
- 03/23/2017 Using Malware Analysis to Identify Overlooked Security Requirements This presentation describes initial research conducted by CERT and Carnegie Mellon to determine if malware report databases were amenable to automated processing to identify flaws
- 03/23/2017 Building Secure Software for Mission Critical Systems This presentation explores the expanding landscape of vulnerabilities that accompanies the increasing reliance on software and then examines some key steps to help mitigate the increased risk.
- 02/23/2017 The CISO Academy In this paper, the authors describe the project that led to the creation of the U.S. Postal Service's CISO Academy.
- 02/16/2017 CYBER LEAPfwd (Learning & Experience Acceleration Platform) Watch Chris May in this Cyber Minute as he discusses "CYBER LEAPfwd", a new educational platform aimed at the next generation of cybersecurity professionals.
- 01/31/2017 Software Solutions Symposium 2017 - Informational Brochure The Software Solutions Symposium is a forum for learning about emerging technologies and practical solutions that you can apply today for help with systemic software issues such as assurance, cost, and schedule. March 20-23, 2017. Arlington, VA
- 01/26/2017 Secure DevOps The DevOps team delivers innovative engineering methods and solutions to challenging cybersecurity problems.
- 01/24/2017 Supply Chain and Commercial-off-the-Shelf (COTS) Assurance The Software Engineering Institute can help your organization apply techniques to reduce software supply chain risk.
- 01/24/2017 Secure Lifecycle Solutions Our innovative engineering methods and solutions help you address your organization's challenging cybersecurity problems.
- 01/05/2017 SQUARE Frequently Asked Questions (FAQ) This paper contains information about SQUARE, a process that helps organizations build security into the early stages of the software production lifecycle.
- 01/03/2017 Using Malware Analysis to Identify Overlooked Security Requirements (MORE) In this presentation, Nancy Mead explains how malware analysis can be used effectively to identify otherwise overlooked security requirements.
- 12/21/2016 Common Sense Guide to Mitigating Insider Threats, 5th Edition Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.
- 12/19/2016 Best Practices for Preventing and Responding to Distributed Denial of Service (DDoS) Attacks In this podcast, CERT researcher Rachel Kartch provides an overview of DDoS attacks and best practices for mitigating and responding to them.
- 12/15/2016 The Critical Role of Positive Incentives for Reducing Insider Threats This report describes how positive incentives complement traditional practices to provide a better balance for organizations’ insider threat programs.
- 12/12/2016 Low Cost Technical Solutions to Jump Start an Insider Threat Program This technical note explores free and low cost technical solutions to help organizations prevent, detect, and respond to malicious insiders.
- 12/09/2016 Fall 2016 Edition of the Secure Coding Newsletter The team discusses changes it plans to make to accounts on the Secure Coding wiki and announces news related to SEI CERT Standard publications.
- 12/09/2016 Security Quality Requirements Engineering (SQUARE) SQUARE helps organizations build security, including privacy, into the early stages of the production lifecycle.
- 12/08/2016 Cyber Security Engineering for Software and Systems Assurance In this podcast Nancy Mead and Carol Woody discuss their new book, Cyber Security Engineering: A Practical Approach for Systems and Software Assurance, which introduces a set of seven principles for software assurance.
- 12/07/2016 Avoiding Insecure C++ This presentation introduces the SEI CERT C++
- 12/06/2016 SEI Education and Training Catalog This catalog describes SEI training and certificates that help you tackle today's software, systems, and cybersecurity challenges.
- 12/01/2016 Blacklist Ecosystem Analysis: January – June, 2016 This short report provides a summary of the various analyses of the blacklist ecosystem performed to date. It also appends the latest additional data to those analyses; the added data in this report covers the time period from January 1, 2016 through June
- 11/30/2016 Construction and Implementation of CERT Secure Coding Rules Improving Automation of Secure Coding This presentation describes the need for secure coding standards, which help reduce vulnerabilities due to programming errors.
- 11/30/2016 Moving Target Defense In this podcast, Andrew Mellinger, a senior software developer in the SEI's Emerging Technology Center discusses work to develop a platform to organize dynamic defenses.
- 11/10/2016 From Secure Coding to Secure Software In this webinar, we discussed how you can improve your organization's secure coding capabilities.
- 11/03/2016 A Scorecard for Cyber Resilience: What We Have Observed In this presentation the speakers discuss the Cyber Resilience Review (CRR).
- 11/03/2016 Automated Code Repair Based on Inferred Specifications In this paper, the authors describe automated repairs for three types of bugs: integer overflows, missing array bounds checks, and missing authorization checks.
- 11/03/2016 Beyond errno: Error Handling in C In this tutorial, David Svoboda examines the technologies available to the C developer for handling errors.
- 11/03/2016 Static Analysis Alert Audits: Lexicon & Rules In this paper, the authors provide a suggested set of auditing rules and a lexicon for auditing static analysis alerts.
- 11/01/2016 Prioritizing Alerts from Static Analysis with Classification Models In this presentation, Lori Flynn describes work toward an automated and accurate statistical classifier, intended to efficiently use analyst effort and to remove code flaws.
- 10/25/2016 A Mapping of the Federal Financial Institutions Examination Council (FFIEC) Cybersecurity Assessment Tool (CAT) to the Cyber Resilience Review (CRR) To help financial organizations assess cyber resilience, we map FFIEC Cybersecurity Assessment Tool (CAT) statements to Cyber Resilience Review (CRR) questions.
- 10/18/2016 Prioritizing Alerts from Static Analysis with Classification Models This poster describes CERT Division research on an automated and accurate statistical classifier.
- 10/13/2016 Predicting Quality Assurance with Software Metrics and Security Methods In this podcast, Dr. Carol Woody explores the connection between measurement, methods for software assurance, and security.
- 09/27/2016 Managing Third Party Risk in Financial Services Organizations: A Resilience-Based Approach A resilience-based approach can help financial services organizations to manage cybersecurity risks from outsourcing and comply with federal regulations.
- 09/22/2016 Exploiting Java Serialization for Fun and Profit In this presentation, David Svoboda explains how exploits can occur using Java serialization.
- 09/19/2016 The Java Security Architecture: How? and Why? In this tutorial, David Svoboda describes the design of Java's security architecture and its pros and cons.
- 09/19/2016 Inside the CERT Oracle Secure Coding Standard for Java In this session, the authors of the CERT Oracle Secure Coding Standard for Java describe how it can be used to secure your Java projects.
- 09/15/2016 Unleashing Your Inner Code Warrior This keynote presentation was given at the 2016 Secure Coding Symposium, where attendees discussed challenges in secure coding and software assurance.
- 09/15/2016 A Community College Curriculum for Secure Software Development In this podcast, Girish Seshagiri discusses a two-year community college software assurance program that he developed and facilitated with SEI Fellow Nancy Mead at Illinois Central College.
- 09/12/2016 Striving for Effective Cyber Workforce Development This paper reviews the issue of cyber awareness and identify efforts to combat this deficiency and concludes with strategies moving forward.
- 09/08/2016 Common Exploits and How to Prevent Them This presentation was given at the 2016 Secure Coding Symposium, where attendees discussed challenges in secure coding and software assurance.
- 09/08/2016 Strengthening the Cyber Ecosystem This keynote presentation was given at the 2016 Secure Coding Symposium, where attendees discussed challenges in secure coding and software assurance.
- 09/02/2016 Summer 2016 Edition of the Secure Coding Newsletter The team discusses its activities, including its new certificate for Java and the upcoming Secure Coding symposium.
- 08/25/2016 Security and the Internet of Things In this podcast, CERT researcher Art Manion discusses work that his team is doing with the Department of Homeland Security to examine and secure IoT devices.
- Becoming a CISO: Formal and Informal Requirements
- Global Value Chain – An Expanded View of the ICT Supply Chain
- Intelligence Preparation for Operational Resilience
- Build Security In Maturity Model (BSIMM) – Practices from Seventy Eight Organizations
- Structuring the Chief Information Security Officer Organization
Search All Our Publications
Search abstracts and the full text of documents by keyword. Refine your search by topic, author, date, and/or type.

- Legal
- Terms of Use
- Privacy Statement
- Intellectual Property
Contact Us