Unintentional Insider Threats: A Foundational Study
Insider Threat Attributes and Mitigation Strategies
Software Assurance Competency Model
Justification of a Pattern for Detecting Intellectual Property Theft by Departing Insiders
Detecting and Preventing Data Exfiltration Through Encrypted Web Sessions via Traffic Inspection
The MAL: A Malware Analysis Lexicon
Common Sense Guide to Mitigating Insider Threats, 4th Edition
The Source Code Analysis Laboratory (SCALe) Webinar
Application of the CERT® Resilience Management Model at Lockheed Martin
Using CERT-RMM in a Software and System Assurance Context
Securing Global Software Supply Chains (Webinar)
Engineering Improvement in Software Assurance: A Landscape Framework (Webinar)
Secure Coding in C and C++, Second Edition
The CERT Oracle Secure Coding Standard for Java
CERT Resilience Management Model: A Maturity Model for Managing Operational Resilience
Software Security Engineering: A Guide for Project Managers
Internet Denial of Service: Attack and Defense Mechanisms
The Cyber Security R&D Pipeline – Building Capability through Science
Source Code Analysis Laboratory (SCALe)
SEI Technologies Forum: Software, Security, and Resiliency
SEI Technologies Forum-- The Insider Threat: Lessons Learned from Actual Insider Attacks
SEI Technologies Forum-- Measuring Operational Resilience
Transforming Your Operational Resilience Management Capabilities: CERT's Resilience Management Model
Securing Global Software Supply Chains
SQUARE Up Your Security Requirements Engineering with SQUARE
Cyber Intelligence Tradecraft Project: Summary of Key Findings
Deriving Software Security Measures from Information Security Standards of Practice
For more information