Latest Additions to the Library
This report presents methods to audit USB device use within a Microsoft Windows environment.
Analyzing Cases of Resilience Success and Failure—A Research Study
This report describes the SEI research study aimed at helping organizations to know the business value of implementing resilience processes and practices, and determine which ones to implement.
Cloud Computing at the Tactical Edge
This technical note presents a strategy to overcome the challenges of obtaining sufficient computation power to run applications needed for warfighting and disaster relief missions. It discusses the use of...
Model-Based Engineering with AADL introduces an architecture-centric approach to discovering software systems problems earlier, when they cost less to solve.
Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector
This report describes a new insider threat study in which researchers extracted technical and behavioral patterns from fraud cases and developed insights and risk indicators of malicious insider activity within...