News

Over the past decade, system resilience (a.k.a., system resiliency) has been widely discussed as a critical concern, especially in terms of data centers and cloud computing. It is also vitally ...
This SEI Blog post highlights the application of MDE tools for automatic code generation and provides a template for collecting information from MDE vendors.
Hello, its Ryan. We've noticed a misconception about IPv6 that is popular on the internet: that IPv6 addresses are hard to ping sweep because there are so many possible addresses.
As software-enabled systems become increasingly complex and interconnected, traditional engineering approaches struggle to keep pace. Model-Based Systems Engineering (MBSE) offers a powerful solution ...
Secure Software by Design is intended to improve the state of this holistic secure development approach by bringing together thought leaders in this area for presentations and discussions on all ...
Since its inception in 1984, the SEI has worked to make software do more, be more secure, deploy faster, and cost less; improving software systems vital to national defense and the broader information ...
A deepfake is a media file—image, video, or speech, typically representing a human subject—that has been altered deceptively using deep neural networks (DNNs) to alter a person’s identity. This ...
This collection contains resources about the Architecture Tradeoff Analysis Method (ATAM), a method for evaluating software architectures against quality attribute goals.
Rust is a programming language that is growing in popularity. While its user base remains small, it is widely regarded as a cool language. According to the Stack Overflow Developer Survey 2022, Rust ...
This blog post expands on concerns brought to light from recent UEFI attacks, such as BlackLotus, and highlights 5 recommendations to secure and restore trust in the UEFI ecosystem.