<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Cybersecurity Engineering</title><link>http://www.sei.cmu.edu/feeds/topic/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Cybersecurity Engineering</description><atom:link href="http://www.sei.cmu.edu/blog/feeds/topic/cybersecurity-engineering/rss/" rel="self"/><language>en-us</language><lastBuildDate>Fri, 21 Nov 2025 00:00:00 -0500</lastBuildDate><item><title>How to Align Security Requirements and Controls to Express System Threats</title><link>https://www.sei.cmu.edu/blog/how-to-align-security-requirements-and-controls-to-express-system-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post presents a method that combines information about security requirements, controls, and capabilities with analysis regarding cyber threats to enable more effective risk-guided system planning.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Elias Miller, Matthew Sisk</dc:creator><pubDate>Fri, 21 Nov 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/how-to-align-security-requirements-and-controls-to-express-system-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Enhancing Security with Cloud Flow Logs</title><link>https://www.sei.cmu.edu/blog/enhancing-security-with-cloud-flow-logs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The SEI has a history of support for flow log analysis, including its 2025 releases (for Azure or AWS) of open-source scripts to facilitate cloud flow log analysis. This blog explores challenges with correlating events across multiple CSPs.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timothy Shimeall</dc:creator><pubDate>Mon, 06 Oct 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/enhancing-security-with-cloud-flow-logs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Stop Imagining Threats, Start Mitigating Them: A Practical Guide to Threat Modeling</title><link>https://www.sei.cmu.edu/blog/stop-imagining-threats-start-mitigating-them-a-practical-guide-to-threat-modeling/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>When building a software-intensive system, a key part in creating a secure and robust solution is to develop a cyber threat model.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alex Vesey</dc:creator><pubDate>Thu, 15 May 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/stop-imagining-threats-start-mitigating-them-a-practical-guide-to-threat-modeling/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Cyber-Informed Machine Learning</title><link>https://www.sei.cmu.edu/blog/cyber-informed-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post proposes cyber-informed machine learning as a conceptual framework for emphasizing three types of explainability when ML is used for cybersecurity.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeffrey Mellon, Clarence Worrell</dc:creator><pubDate>Mon, 10 Feb 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/cyber-informed-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Machine Learning</category><category>Cybersecurity Engineering</category><category>AI Engineering and Machine Learning</category></item><item><title>13 Cybersecurity Predictions for 2025</title><link>https://www.sei.cmu.edu/blog/13-cybersecurity-predictions-for-2025/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>It’s that time of year when we reflect on the past year and eagerly look forward. This post presents 13 cyber predictions for 2025.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Gregory Touhill</dc:creator><pubDate>Tue, 21 Jan 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/13-cybersecurity-predictions-for-2025/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>An Introduction to Hardening Docker Images</title><link>https://www.sei.cmu.edu/blog/an-introduction-to-hardening-docker-images/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Through our work, we have seen stakeholders encountering difficulty with hardening open source container images for vulnerability mitigation.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maxwell Trdina, Sasank Vishnubhatla</dc:creator><pubDate>Mon, 11 Nov 2024 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/an-introduction-to-hardening-docker-images/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>A Framework for Detection in an Era of Rising Deepfakes</title><link>https://www.sei.cmu.edu/blog/a-framework-for-detection-in-an-era-of-rising-deepfakes/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post details the evolving deepfake landscape and introduces a framework for detection.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Matt Walsh</dc:creator><pubDate>Mon, 28 Oct 2024 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/a-framework-for-detection-in-an-era-of-rising-deepfakes/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Evaluating Static Analysis Alerts with LLMs</title><link>https://www.sei.cmu.edu/blog/evaluating-static-analysis-alerts-with-llms/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>LLMs show promising initial results in adjudicating static analysis alerts, offering possibilities for better vulnerability detection. This post discusses initial experiments using GPT-4 to evaluate static analysis alerts.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Klieber, Lori Flynn</dc:creator><pubDate>Mon, 07 Oct 2024 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/evaluating-static-analysis-alerts-with-llms/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Static Analysis</category><category>AI Engineering and Machine Learning</category><category>Secure Coding</category></item><item><title>3 API Security Risks and Recommendations for Mitigation</title><link>https://www.sei.cmu.edu/blog/3-api-security-risks-and-recommendations-for-mitigation/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post presents three top API security risks along with recommendations for mitigating them.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">McKinley Sconiers-Hasan</dc:creator><pubDate>Mon, 15 Jul 2024 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/3-api-security-risks-and-recommendations-for-mitigation/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Redemption: A Prototype for Automated Repair of Static Analysis Alerts</title><link>https://www.sei.cmu.edu/blog/redemption-a-prototype-for-automated-repair-of-static-analysis-alerts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post introduces Redemption, an open source tool that uses automated code repair technology to repair static analysis alerts in C/C++ source code.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Svoboda</dc:creator><pubDate>Mon, 10 Jun 2024 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/redemption-a-prototype-for-automated-repair-of-static-analysis-alerts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Testing</category><category>Static Analysis</category></item><item><title>Versioning with Git Tags and Conventional Commits</title><link>https://www.sei.cmu.edu/blog/versioning-with-git-tags-and-conventional-commits/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post explores extending the conventional commit paradigm to enable automatic semantic versioning with git tags to streamline the development and deployment of software.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alex Vesey</dc:creator><pubDate>Wed, 29 May 2024 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/versioning-with-git-tags-and-conventional-commits/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>API Security through Contract-Driven Programming</title><link>https://www.sei.cmu.edu/blog/api-security-through-contract-driven-programming/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post explores contract programming and specifically how that applies to the building, maintenance, and security of APIs.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alex Vesey</dc:creator><pubDate>Mon, 18 Mar 2024 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/api-security-through-contract-driven-programming/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Explainability in Cybersecurity Data Science</title><link>https://www.sei.cmu.edu/blog/explainability-in-cybersecurity-data-science/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post provides an overview of explainability in machine learning and includes illustrations of model-to-human and human-to-model explainability.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeffrey Mellon, Clarence Worrell</dc:creator><pubDate>Mon, 20 Nov 2023 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/explainability-in-cybersecurity-data-science/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Secure by Design at CERT</title><link>https://www.sei.cmu.edu/blog/secure-by-design-at-cert/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The national cybersecurity strategy calls on tech providers to ensure that all their products are secure by design and secure by default. This post highlights the SEI CERT Division's continued and longstanding efforts to ensure security by design in fielded software.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Gregory Touhill</dc:creator><pubDate>Mon, 09 Oct 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/secure-by-design-at-cert/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>3 Activities for Making Software Secure by Design</title><link>https://www.sei.cmu.edu/blog/3-activities-for-making-software-secure-by-design/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Understanding key principles, roadblocks, and accelerators can shift the secure software development paradigm.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Carol Woody, Robert Schiela</dc:creator><pubDate>Tue, 05 Sep 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/3-activities-for-making-software-secure-by-design/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Development</category><category>Cybersecurity</category></item><item><title>Using Game Theory to Advance the Quest for Autonomous Cyber Threat Hunting</title><link>https://www.sei.cmu.edu/blog/Using-Game-Theory-to-Advance-Cyber-Threat-Hunting/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post describes an effort to apply game theory to the development of algorithms suitable for informing a fully autonomous threat hunting capability and introduces the concept of chain games, a set of games in which threat hunting strategies can be evaluated and refined.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Phil Groce</dc:creator><pubDate>Mon, 24 Jul 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/Using-Game-Theory-to-Advance-Cyber-Threat-Hunting/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category></item><item><title>8 Areas of Future Research in Zero Trust</title><link>https://www.sei.cmu.edu/blog/8-areas-of-future-research-in-zero-trust/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The National Cybersecurity Strategy was released on March 1st, 2023 to improve federal cybersecurity through the implementation of a zero trust architecture.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Matthew Nicolai, Trista Polaski, Timothy Morrow</dc:creator><pubDate>Mon, 24 Apr 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/8-areas-of-future-research-in-zero-trust/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Zero Trust</category></item><item><title>Security Analytics: Using SiLK and Mothra to Identify Data Exfiltration via the Domain Name Service</title><link>https://www.sei.cmu.edu/blog/security-analytics-using-silk-and-mothra-to-identify-data-exfiltration-via-the-domain-name-service/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post explores how the DNS protocol can be abused to exfiltrate data by adding bytes of data onto DNS queries.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timothy Shimeall</dc:creator><pubDate>Mon, 03 Apr 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/security-analytics-using-silk-and-mothra-to-identify-data-exfiltration-via-the-domain-name-service/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>SOC Analytics</category></item><item><title>The Benefits of Cyber Assessment Training</title><link>https://www.sei.cmu.edu/blog/the-benefits-of-cyber-assessment-training/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post discusses how cybersecurity assessments can help critical infrastructure organizations improve their cybersecurity with help from free assessment tools developed by the SEI and offered by the U.S. government.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rhonda Brown, Alexander Petrilli</dc:creator><pubDate>Mon, 13 Mar 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-benefits-of-cyber-assessment-training/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity Engineering</category><category>Cyber Risk and Resilience Management</category><category>Cybersecurity</category><category>Cyber Workforce Development</category></item><item><title>5 Best Practices from Industry for Implementing a Zero Trust Architecture</title><link>https://www.sei.cmu.edu/blog/5-best-practices-from-industry-for-implementing-a-zero-trust-architecture/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post presents 5 best practices from industry on implementing a zero trust architecture and discusses why they are significant.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Matthew Nicolai, Nathaniel Richmond, Timothy Morrow</dc:creator><pubDate>Mon, 06 Mar 2023 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/5-best-practices-from-industry-for-implementing-a-zero-trust-architecture/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Zero Trust</category></item></channel></rss>