<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>SEI Blog</title><link href="http://www.sei.cmu.edu/feeds/latest/atom/?utm_source=blog&amp;utm_medium=rss" rel="alternate"/><link href="http://www.sei.cmu.edu/feeds/latest/atom/?utm_source=blog&amp;utm_medium=rss" rel="self"/><id>http://www.sei.cmu.edu/feeds/latest/atom/?utm_source=blog&amp;utm_medium=rss</id><updated>2026-03-04T00:00:00-05:00</updated><subtitle>Updates on changes and additions to the SEI Blog.</subtitle><entry><title>The Five Pillars of Software Assurance in System Acquisition</title><link href="https://www.sei.cmu.edu/blog/the-five-pillars-of-software-assurance-in-system-acquisition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2026-03-04T00:00:00-05:00</published><updated>2026-03-04T00:00:00-05:00</updated><author><name>Dr. Carol Woody, Christopher Alberts, Michael Bandor, Timothy A. Chick</name></author><id>https://www.sei.cmu.edu/blog/the-five-pillars-of-software-assurance-in-system-acquisition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post presents five foundational capabilities to support the acquisition of a system with effective software assurance.</summary></entry><entry><title>An Approach to Accelerate Verification and Software Standards Testing with LLMs</title><link href="https://www.sei.cmu.edu/blog/an-approach-to-accelerate-verification-and-software-standards-testing-with-llms/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2026-02-09T00:00:00-05:00</published><updated>2026-02-09T00:00:00-05:00</updated><author><name>Ryan Karl, Yash Hindka, Shen Zhang, John Robert</name></author><id>https://www.sei.cmu.edu/blog/an-approach-to-accelerate-verification-and-software-standards-testing-with-llms/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post highlights the work of SEI researchers who sought to prove that LLMs can be used in unclassified environments to rapidly develop tools that could then be used to accelerate software analysis in classified environments.</summary></entry><entry><title>From Concept to Practice: How SSVC Has Evolved to Make Adoption Possible</title><link href="https://www.sei.cmu.edu/blog/from-concept-to-practice-how-ssvc-has-evolved-to-make-adoption-possible/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2026-01-28T00:00:00-05:00</published><updated>2026-01-28T00:00:00-05:00</updated><author><name>Renae Metcalf, Allen Householder, Vijay Sarvepalli</name></author><id>https://www.sei.cmu.edu/blog/from-concept-to-practice-how-ssvc-has-evolved-to-make-adoption-possible/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post traces the milestones of the Stakeholder Specific Vulnerability Categorization and invites the community to participate, contribute, and benefit from the continued maturation of SSVC.</summary></entry><entry><title>An Open Source Tool to Unravel UEFI and its Vulnerabilities</title><link href="https://www.sei.cmu.edu/blog/an-open-source-tool-to-unravel-uefi-and-its-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2026-01-22T00:00:00-05:00</published><updated>2026-01-22T00:00:00-05:00</updated><author><name>Vijay Sarvepalli, Renae Metcalf, Cory Cohen</name></author><id>https://www.sei.cmu.edu/blog/an-open-source-tool-to-unravel-uefi-and-its-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post introduces CERT UEFI Parser, a new, open source tool that uses program analysis to reveal the architecture of UEFI software, and explore this veiled source of vulnerabilities.</summary></entry><entry><title>Upskilling the Federal Cybersecurity Workforce</title><link href="https://www.sei.cmu.edu/blog/upskilling-the-federal-cybersecurity-workforce/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2026-01-20T00:00:00-05:00</published><updated>2026-01-20T00:00:00-05:00</updated><author><name>Christopher Herr</name></author><id>https://www.sei.cmu.edu/blog/upskilling-the-federal-cybersecurity-workforce/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post details how the SEI Cyber Mission Readiness Team, in partnership with CISA, developed a series of Skilling Continuation Labs to provide unique, hands-on, immersive training to upskill the federal cybersecurity workforce.</summary></entry><entry><title>The Top 10 Blog Posts of 2025</title><link href="https://www.sei.cmu.edu/blog/the-top-10-blog-posts-of-2025/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2026-01-12T00:00:00-05:00</published><updated>2026-01-12T00:00:00-05:00</updated><author><name>Thomas Longstaff</name></author><id>https://www.sei.cmu.edu/blog/the-top-10-blog-posts-of-2025/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Every January on the SEI Blog, we present the 10 most-visited posts from the previous year.</summary></entry><entry><title>Analyzing Partially Encrypted Network Flows with Mid-Encryption</title><link href="https://www.sei.cmu.edu/blog/analyzing-partially-encrypted-network-flows-with-mid-encryption/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-12-15T00:00:00-05:00</published><updated>2025-12-15T00:00:00-05:00</updated><author><name>Steven Ibarra, Mark Thomas</name></author><id>https://www.sei.cmu.edu/blog/analyzing-partially-encrypted-network-flows-with-mid-encryption/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Encrypted traffic has come to dominate network flows, which makes it difficult for traditional flow monitoring tools to maintain visibility. In this blog post we take a closer look at a new feature added to CERT’s Yet Another Flowmeter tool (YAF) to capture the attributes of encryption when it occurs after the start of the session. We call this mid-encryption.</summary></entry><entry><title>Tailoring 9 Zero Trust and Security Principles to Weapon Systems</title><link href="https://www.sei.cmu.edu/blog/tailoring-9-zero-trust-and-security-principles-to-weapon-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-12-09T00:00:00-05:00</published><updated>2025-12-09T00:00:00-05:00</updated><author><name>Christopher Alberts, Timothy Morrow, Rhonda Brown, Charles Wallen</name></author><id>https://www.sei.cmu.edu/blog/tailoring-9-zero-trust-and-security-principles-to-weapon-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Our latest post outlines how 9 zero trust and security principles might apply to weapon systems.</summary></entry><entry><title>AI-Powered Memory Safety with the Pointer Ownership Model</title><link href="https://www.sei.cmu.edu/blog/ai-powered-memory-safety-with-the-pointer-ownership-model/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-12-03T00:00:00-05:00</published><updated>2025-12-03T00:00:00-05:00</updated><author><name>David Svoboda, Lori Flynn</name></author><id>https://www.sei.cmu.edu/blog/ai-powered-memory-safety-with-the-pointer-ownership-model/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post highlights work to automate C Code Security with AI-Powered memory safety.</summary></entry><entry><title>How to Align Security Requirements and Controls to Express System Threats</title><link href="https://www.sei.cmu.edu/blog/how-to-align-security-requirements-and-controls-to-express-system-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-11-21T00:00:00-05:00</published><updated>2025-11-21T00:00:00-05:00</updated><author><name>Elias Miller, Matthew Sisk</name></author><id>https://www.sei.cmu.edu/blog/how-to-align-security-requirements-and-controls-to-express-system-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post presents a method that combines information about security requirements, controls, and capabilities with analysis regarding cyber threats to enable more effective risk-guided system planning.</summary></entry><entry><title>From Hype to Adoption: Guiding Organizations in Their AI Journey</title><link href="https://www.sei.cmu.edu/blog/from-hype-to-adoption-guiding-organizations-in-their-ai-journey/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-11-10T00:00:00-05:00</published><updated>2025-11-10T00:00:00-05:00</updated><author><name>Ipek Ozkaya, Anita Carleton, Erin Harper, Natalie Schieber, Robert Edman</name></author><id>https://www.sei.cmu.edu/blog/from-hype-to-adoption-guiding-organizations-in-their-ai-journey/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">After a flurry of initial investments in artificial intelligence, including generative and agentic AI, many organizations are facing mixed results. The SEI is examining how organizations adopt AI and what methods they can use to measure and improve their adoption for long-term success.</summary></entry><entry><title>A Model-Based Approach for Software Acquisition</title><link href="https://www.sei.cmu.edu/blog/a-model-based-approach-for-software-acquisition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-11-03T00:00:00-05:00</published><updated>2025-11-03T00:00:00-05:00</updated><author><name>Colin Dempsey, Jerome Hugues</name></author><id>https://www.sei.cmu.edu/blog/a-model-based-approach-for-software-acquisition/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The Department of War (DoW) is undergoing a significant transformation in how it acquires and develops software systems. Central to this evolution is the shift from traditional document-based processes to model-centric methodologies.</summary></entry><entry><title>Modeling Services with Model-Based Systems Engineering (MBSE)</title><link href="https://www.sei.cmu.edu/blog/modeling-services-with-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-10-28T00:00:00-04:00</published><updated>2025-10-28T00:00:00-04:00</updated><author><name>Nataliya Shevchenko, Grigoriy Shevchenko</name></author><id>https://www.sei.cmu.edu/blog/modeling-services-with-model-based-systems-engineering-mbse/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post explores an approach to designing services using model-based systems engineering (MBSE) with OMG’s Unified Architecture Framework (UAF).</summary></entry><entry><title>Radio-Frequency Attacks: Securing the OSI Stack</title><link href="https://www.sei.cmu.edu/blog/radio-frequency-attacks-securing-the-osi-stack/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-10-20T00:00:00-04:00</published><updated>2025-10-20T00:00:00-04:00</updated><author><name>Joseph McIlvenny</name></author><id>https://www.sei.cmu.edu/blog/radio-frequency-attacks-securing-the-osi-stack/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post reviews common radio frequency attacks and investigates how software and cybersecurity play key roles in these exploitations.</summary></entry><entry><title>What’s New in SSVC: Build, Explore, and Evolve Your Decision Models</title><link href="https://www.sei.cmu.edu/blog/whats-new-in-ssvc-build-explore-and-evolve-your-decision-models/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-10-13T00:00:00-04:00</published><updated>2025-10-13T00:00:00-04:00</updated><author><name>Bon Jin Koo, Renae Metcalf, Vijay Sarvepalli, Allen Householder</name></author><id>https://www.sei.cmu.edu/blog/whats-new-in-ssvc-build-explore-and-evolve-your-decision-models/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Recent updates to the Stakeholder-Specific Vulnerability Categorization (SSVC) framework help different stakeholders to prioritize vulnerabilities according to their distinct risk appetites.</summary></entry><entry><title>Enhancing Security with Cloud Flow Logs</title><link href="https://www.sei.cmu.edu/blog/enhancing-security-with-cloud-flow-logs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-10-06T00:00:00-04:00</published><updated>2025-10-06T00:00:00-04:00</updated><author><name>Timothy Shimeall</name></author><id>https://www.sei.cmu.edu/blog/enhancing-security-with-cloud-flow-logs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The SEI has a history of support for flow log analysis, including its 2025 releases (for Azure or AWS) of open-source scripts to facilitate cloud flow log analysis. This blog explores challenges with correlating events across multiple CSPs.</summary></entry><entry><title>5 Essential Questions for Implementing the Software Acquisition Pathway and the Tools to Tackle Them</title><link href="https://www.sei.cmu.edu/blog/five-essential-questions-for-implementing-the-software-acquisition-pathway/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-09-23T00:00:00-04:00</published><updated>2025-09-23T00:00:00-04:00</updated><author><name>Eileen Wrubel, Rita Creel, Brigid O'Hearn</name></author><id>https://www.sei.cmu.edu/blog/five-essential-questions-for-implementing-the-software-acquisition-pathway/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post outlines 5 essential questions to ask before implementing the Software Acquisition Pathway (SWP) and an SEI toolset to assist in the effort.</summary><category term="Software Engineering Research and Development"/></entry><entry><title>A Call to Action: Building a Foundation for Model-Based Systems Engineering in Digital Engineering</title><link href="https://www.sei.cmu.edu/blog/a-call-to-action-building-a-foundation-for-model-based-systems-engineering-in-digital-engineering/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-09-15T00:00:00-04:00</published><updated>2025-09-15T00:00:00-04:00</updated><author><name>Peter Capell, William Hayes, Jerome Hugues, Nataliya Shevchenko</name></author><id>https://www.sei.cmu.edu/blog/a-call-to-action-building-a-foundation-for-model-based-systems-engineering-in-digital-engineering/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The SEI brought together stakeholders who have been engaging and actively innovating in the dynamic environment of digital engineering. This blog post highlights calls to action for future work in MBSE and digital engineering from practitioners in the field.</summary></entry><entry><title>My AI System Works…But Is It Safe to Use?</title><link href="https://www.sei.cmu.edu/blog/my-ai-system-worksbut-is-it-safe-to-use/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-09-09T00:00:00-04:00</published><updated>2025-09-09T00:00:00-04:00</updated><author><name>David Schulker, Matt Walsh, Emil Mathew</name></author><id>https://www.sei.cmu.edu/blog/my-ai-system-worksbut-is-it-safe-to-use/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post introduce System Theoretic Process Analysis (STPA), a hazard analysis technique uniquely suitable for dealing with the complexity of AI systems.</summary></entry><entry><title>7 Recommendations to Improve SBOM Quality</title><link href="https://www.sei.cmu.edu/blog/7-recommendations-to-improve-sbom-quality/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-08-25T00:00:00-04:00</published><updated>2025-08-25T00:00:00-04:00</updated><author><name>David Tobar, Jessie Jamieson, Mark Priest, Jason Fricke</name></author><id>https://www.sei.cmu.edu/blog/7-recommendations-to-improve-sbom-quality/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">There is growing interest in using SBOMs to support software supply chain risk management. This post recommends seven ways to improve SBOM accuracy.</summary></entry></feed>