News

Software Engineering Institute (SEI) is marking 40 years as a cornerstone of advancing software as a strategic advantage for ...
The 15th practice described in the newly released edition of the Common Sense Guide to Mitigating Insider Threats is Practice 15: Enforce separation of duties and least privilege. In this post, I ...
This post summarizes the benefits, practices, and tools for using a modeling language and compares the capabilities of SysML and AADL for use in model-based systems engineering (MBSE).
How do you analyze a large language model (LLM) for harmful biases? The 2022 release of ChatGPT launched LLMs onto the public stage. Applications that use LLMs are suddenly everywhere, from customer ...
This blog post explores large language models (LLMs) in software development, implications of incorporating LLMs into software-reliant systems, and areas where more research is needed to advance their ...
This SEI Blog post highlights the application of MDE tools for automatic code generation and provides a template for collecting information from MDE vendors.
This SEI Blog post describes efforts to develop fuzzy hashing, a technique to help analysts determine if two pieces of suspected malware are similar.
Hello, its Ryan. We've noticed a misconception about IPv6 that is popular on the internet: that IPv6 addresses are hard to ping sweep because there are so many possible addresses.
The DevSecOps Platform-Independent Model gives instructions on creating, maintaining, and evolving DevSecOps pipelines.
Researchers, vendors, and government bodies gathered to share solutions for implementing a zero trust architecture.
This post explores the relationship between DevSecOps and value stream mapping, both of which are rooted in the Lean approach to systems and workflow. It also provides guidance on preparing to conduct ...
This collection contains resources about the Architecture Tradeoff Analysis Method (ATAM), a method for evaluating software architectures against quality attribute goals.