- Advanced Computing
- Agile
- AI-Augmented Software Engineering
- Artificial Intelligence Engineering
- Cloud Computing
- Continuous Deployment of Capability
- Cyber-Physical Systems
- Cybersecurity Center Development
- Cybersecurity Engineering
- Cyber Workforce Development
- Edge Computing
- Enterprise Risk and Resilience Management
- Innovative Acquisition
- Insider Threat
- Model-Based Systems Engineering
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Securing AI
- Security Vulnerabilities
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
Managing Security and Resilience Risks Across the Lifecycle
This post introduces the Security Engineering Framework, a schema of software-focused engineering practices that acquisition programs can use to manage security and resilience risks across the lifecycle.
Read More•By Christopher J. Alberts, Charles M. Wallen, Carol Woody, Michael S. Bandor
In Secure Development


A Practitioner-Focused DevSecOps Assessment Approach
Regular DevSecOps assessments are necessary to track progress, adapt to evolving needs, and ensure you are consistently delivering value to your end users with speed, security, and efficiency.
Read More•By Aaron K. Reffett, Timothy A. Chick
In Continuous Deployment of Capability


Amplifying AI Readiness in the DoD Workforce
The SEI recently partnered with the Department of the Air Force Chief Data and AI Office to develop a strategy to identify and assess hidden workforce talent for data and …
Read More•By Eric Keylor, Robert W. Beveridge, Jonathan Frederick
In Artificial Intelligence Engineering


Radio Frequency 101: Can You Really Hack a Radio Signal?
Recent reports indicate the DoD is susceptible to radio frequency (RF) attacks. This post discusses common RF tools and ways malicious actors can attack systems.
Read More•By Roxxanne White, Michael Bragg
In Cyber-Physical Systems


Out of Distribution Detection: Knowing When AI Doesn't Know
How do we know when an AI system is operating outside its intended knowledge boundaries?
Read More•By Eric Heim, Cole Frank
In Artificial Intelligence Engineering


Delivering Resilient Software Capability to the Warfighter at the Speed of Relevance
With the Department of Defense (DoD) emphasizing the development and deployment of capabilities to the warfighter, SEI director Paul Nielsen outlines the ways in which our research and development support …
Read More•By Paul Nielsen
In Software Engineering Research and Development

A 5-Stage Process for Automated Testing and Delivery of Complex Software Systems
Managing and maintaining deployments of complex software present engineers with a multitude of challenges including security vulnerabilities.
Read More•By Caden Milne, Lyndsi A. Hughes
In Continuous Deployment of Capability


Stop Imagining Threats, Start Mitigating Them: A Practical Guide to Threat Modeling
When building a software-intensive system, a key part in creating a secure and robust solution is to develop a cyber threat model.
Read More•By Alex Vesey
In Cybersecurity Engineering

10 Things Organizations Should Know About AI Workforce Development
This post outlines 10 recommendations developed in response to work with our mission partners in the Department of Defense.
Read More•By Jonathan Frederick, Dominic A. Ross, Eric Keylor, Cole Frank, Intae Nam
In Artificial Intelligence Engineering


DataOps: Towards More Reliable Machine Learning Systems
Decisions based on ML models can have significant consequences, and managing the raw material—data—in ML systems is a challenge. This post explains DataOps, an area that focuses on the management …
Read More•By Daniel DeCapria
In Artificial Intelligence Engineering

Explore Topics
- Advanced Computing
- Agile
- AI-Augmented Software Engineering
- Artificial Intelligence Engineering
- Cloud Computing
- Continuous Deployment of Capability
- Cyber-Physical Systems
- Cybersecurity Center Development
- Cybersecurity Engineering
- Cyber Workforce Development
- Edge Computing
- Enterprise Risk and Resilience Management
- Innovative Acquisition
- Insider Threat
- Model-Based Systems Engineering
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Securing AI
- Security Vulnerabilities
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
Get updates on our latest work.
Sign up to have the latest post sent to your inbox weekly.
Subscribe Get our RSS feedGet updates on our latest work.
Each week, our researchers write about the latest in software engineering, cybersecurity and artificial intelligence. Sign up to get the latest post sent to your inbox the day it's published.
Subscribe Get our RSS feed