Legacy systems, built decades ago with technologies that are fast becoming obsolete, represent a massive operations and maintenance expense for organizations. In this blog post, SEI researcher William Wood provides a case study of a recent modernization of an IT legacy system.
Vulnerabilities often result in software that does not function as intended, allowing attackers to compromise a system. This blog post highlights techniques used for addressing software defects and how those can be applied to improve security detection and management.
This blog post by CERT Chief Scientist Greg Shannon introduces the CERT Insider Threat Center blog, which highlights the latest research and security solutions to help organizations protect against insider threat.
This blog post from CERT Chief Scientist Greg Shannon highlights security vulnerability and network security resources to help organizations in government and industry protect against breaches that compromise data.
A new consortium at the SEI takes a unique approach to researching and teaching cyber intelligence.
In this blog post, SEI principal researcher Donald Firesmith presents and defines four approaches for shift left testing using variants of the classic V model.
Expert Office Hours, Architecture Boot Camp Add New Dimensions to SATURN 2015
Article - 04/01/2015
11th SATURN Technical Program Explores Cutting-Edge Methods and Essential Skills for Software Architects
Press Release - 02/19/2015
CERT Cyber Risk Insurance Symposium
Monetary losses due to cybersecurity events have increased the market for cyber risk insurance. At this May 19 event, we will explore the related challenges and offer ideas.
Conferences - 05/19/2015
Software Solutions Conference 2015
The SEI Software Solutions Conference addresses the challenges of developing, acquiring, and sustaining software-reliant systems today and in the near future.
Conferences - 11/16/2015