<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>SEI Blog | Situational Awareness</title><link href="http://www.sei.cmu.edu/feeds/topic/situational-awareness/atom/?utm_source=blog&amp;utm_medium=rss" rel="alternate"/><link href="http://www.sei.cmu.edu/feeds/topic/situational-awareness/atom/?utm_source=blog&amp;utm_medium=rss" rel="self"/><id>http://www.sei.cmu.edu/feeds/topic/situational-awareness/atom/?utm_source=blog&amp;utm_medium=rss</id><updated>2025-12-15T00:00:00-05:00</updated><subtitle>Updates on changes and additions to the                         SEI Blog for posts matching Situational Awareness</subtitle><entry><title>Analyzing Partially Encrypted Network Flows with Mid-Encryption</title><link href="https://www.sei.cmu.edu/blog/analyzing-partially-encrypted-network-flows-with-mid-encryption/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-12-15T00:00:00-05:00</published><updated>2025-12-15T00:00:00-05:00</updated><author><name>Steven Ibarra, Mark Thomas</name></author><id>https://www.sei.cmu.edu/blog/analyzing-partially-encrypted-network-flows-with-mid-encryption/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Encrypted traffic has come to dominate network flows, which makes it difficult for traditional flow monitoring tools to maintain visibility. In this blog post we take a closer look at a new feature added to CERT’s Yet Another Flowmeter tool (YAF) to capture the attributes of encryption when it occurs after the start of the session. We call this mid-encryption.</summary></entry><entry><title>Dealing with Noisy Behavioral Analytics in Detection Engineering</title><link href="https://www.sei.cmu.edu/blog/dealing-with-noisy-behavioral-analytics-in-detection-engineering/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-10-30T00:00:00-04:00</published><updated>2023-10-30T00:00:00-04:00</updated><author><name>Sean Hutchison</name></author><id>https://www.sei.cmu.edu/blog/dealing-with-noisy-behavioral-analytics-in-detection-engineering/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post discusses a process for tuning and related work you can do to make behavioral analytics more viable in your environment, without sacrificing analytic coverage.</summary></entry><entry><title>Netflow in the Era of EDR and Cloud: Helicopter Parenting for Your Network</title><link href="https://www.sei.cmu.edu/blog/netflow-in-the-era-of-edr-and-cloud-helicopter-parenting-for-your-network/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-08-14T00:00:00-04:00</published><updated>2023-08-14T00:00:00-04:00</updated><author><name>Daniel Ruef</name></author><id>https://www.sei.cmu.edu/blog/netflow-in-the-era-of-edr-and-cloud-helicopter-parenting-for-your-network/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Despite well-defined security policies, technical safeguards, and extensive user education, people still make mistakes and adversaries still succeed. A similar situation exists in raising children.</summary></entry><entry><title>How Situational Awareness Informs Cybersecurity Operations</title><link href="https://www.sei.cmu.edu/blog/how-situational-awareness-informs-cybersecurity-operations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-02-08T00:00:00-05:00</published><updated>2021-02-08T00:00:00-05:00</updated><author><name>Nathaniel Richmond</name></author><id>https://www.sei.cmu.edu/blog/how-situational-awareness-informs-cybersecurity-operations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Situational awareness (SA) helps decision makers throughout an organization have the information and understanding they need to make sound decisions about cybersecurity operations. In this blog post, I review and provide examples of how to use SA in cybersecurity operations.</summary><category term="Network Situational Awareness"/></entry><entry><title>Pandemic Home Security for Your Enterprise</title><link href="https://www.sei.cmu.edu/blog/pandemic-home-security-for-your-enterprise/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-01-25T00:00:00-05:00</published><updated>2021-01-25T00:00:00-05:00</updated><author><name>Phil Groce, Harry Caskey</name></author><id>https://www.sei.cmu.edu/blog/pandemic-home-security-for-your-enterprise/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The COVID-19 pandemic has greatly increased remote work among enterprise employees. Home-network environments are not professionally managed, so they are an appealing target for attackers. In this post, we advise how to mitigate these risks to regain a security footing.</summary><category term="Network Situational Awareness"/><category term="Best Practices in Network Security"/></entry><entry><title>Remote Work: Vulnerabilities and Threats to the Enterprise</title><link href="https://www.sei.cmu.edu/blog/remote-work-vulnerabilities-and-threats-to-the-enterprise/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-01-18T00:00:00-05:00</published><updated>2021-01-18T00:00:00-05:00</updated><author><name>Phil Groce</name></author><id>https://www.sei.cmu.edu/blog/remote-work-vulnerabilities-and-threats-to-the-enterprise/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">How has this change in the way we work altered our security posture? How has it changed our attack surface, and what should we be doing to defend it? In this blog post, I explore the answers to these questions.</summary><category term="Network Situational Awareness"/><category term="Best Practices in Network Security"/></entry><entry><title>Is Your Organization Using Cybersecurity Analysis Effectively?</title><link href="https://www.sei.cmu.edu/blog/is-your-organization-using-cybersecurity-analysis-effectively/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-08-31T00:00:00-04:00</published><updated>2020-08-31T00:00:00-04:00</updated><author><name>Angela Horneman</name></author><id>https://www.sei.cmu.edu/blog/is-your-organization-using-cybersecurity-analysis-effectively/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post explores how organizations can effectively use cybersecurity analysis and discusses the importance of an effective incident response plan.</summary><category term="Network Situational Awareness"/><category term="Cybersecurity"/></entry><entry><title>Situational Awareness for Cybersecurity Architecture: 5 Recommendations</title><link href="https://www.sei.cmu.edu/blog/situational-awareness-cybersecurity-architecture-5-recommendations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-07-13T00:00:00-04:00</published><updated>2020-07-13T00:00:00-04:00</updated><author><name>Phil Groce</name></author><id>https://www.sei.cmu.edu/blog/situational-awareness-cybersecurity-architecture-5-recommendations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In this post on situational awareness for cybersecurity, we present five recommendations for the practice of architecture in the service of cybersecurity situational awareness (SA)....</summary><category term="Network Situational Awareness"/><category term="Situational Awareness"/></entry><entry><title>COVID-19 and Supply-Chain Risk</title><link href="https://www.sei.cmu.edu/blog/covid-19-and-supply-chain-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-06-08T00:00:00-04:00</published><updated>2020-06-08T00:00:00-04:00</updated><author><name>Nathaniel Richmond</name></author><id>https://www.sei.cmu.edu/blog/covid-19-and-supply-chain-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Managing supply-chain risks from the new coronavirus outbreak is personally important to me. While my first concern--like everyone else's--is mitigating the direct public-health risk....</summary><category term="Resilience Management Model (RMM)"/><category term="Supply Chains"/></entry><entry><title>Situational Awareness for Cyber Security Architecture: Tools for Monitoring and Response</title><link href="https://www.sei.cmu.edu/blog/situational-awareness-for-cyber-security-architecture-tools-for-monitoring-and-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-05-11T00:00:00-04:00</published><updated>2020-05-11T00:00:00-04:00</updated><author><name>Timothy Shimeall</name></author><id>https://www.sei.cmu.edu/blog/situational-awareness-for-cyber-security-architecture-tools-for-monitoring-and-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Visibility into the activities within assets enables network security analysts to detect network compromises. Analysts monitor these activities directly on the device....</summary><category term="Network Situational Awareness"/><category term="Situational Awareness"/></entry><entry><title>Situational Awareness for Cybersecurity Architecture: Network Visibility</title><link href="https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-architecture-network-visibility/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-03-23T00:00:00-04:00</published><updated>2020-03-23T00:00:00-04:00</updated><author><name>Timur Snoke</name></author><id>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-architecture-network-visibility/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Network compromises cannot be detected without visibility into the activities within assets. Network security analysts can view these activities in one of two places....</summary><category term="Network Situational Awareness"/><category term="Situational Awareness"/></entry><entry><title>Engineering for Cyber Situational Awareness: Endpoint Visibility</title><link href="https://www.sei.cmu.edu/blog/engineering-for-cyber-situational-awareness-endpoint-visibility/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-02-10T00:00:00-05:00</published><updated>2020-02-10T00:00:00-05:00</updated><author><name>Phil Groce, Timur Snoke</name></author><id>https://www.sei.cmu.edu/blog/engineering-for-cyber-situational-awareness-endpoint-visibility/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In this post, we aim to help network security analysts understand the components of a cybersecurity architecture, starting with how we can use endpoint information....</summary><category term="Network Situational Awareness"/><category term="Situational Awareness"/></entry><entry><title>Situational Awareness for Cybersecurity: Three Key Principles of Effective Policies and Controls</title><link href="https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-three-key-principles-of-effective-policies-and-controls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-11-18T00:00:00-05:00</published><updated>2019-11-18T00:00:00-05:00</updated><author><name>Angela Horneman</name></author><id>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-three-key-principles-of-effective-policies-and-controls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Security measures are most effective when it is clear how assets are supposed to be used and by whom....</summary><category term="Network Situational Awareness"/><category term="Situational Awareness"/></entry><entry><title>Network Traffic Analysis with SiLK: Profiling and Investigating Cyber Threats</title><link href="https://www.sei.cmu.edu/blog/network-traffic-analysis-with-silk-profiling-and-investigating-cyber-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-10-28T00:00:00-04:00</published><updated>2019-10-28T00:00:00-04:00</updated><author><name>Paul Krystosek, Timothy Shimeall, Nancy Ott</name></author><id>https://www.sei.cmu.edu/blog/network-traffic-analysis-with-silk-profiling-and-investigating-cyber-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Cyber threats are on the rise, making it vitally important to understand what's happening on our computer networks. But the massive amount of network traffic makes this job hard....</summary><category term="Network Traffic Analysis "/></entry><entry><title>Situational Awareness for Cybersecurity: Assets and Risk</title><link href="https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-assets-and-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-10-16T00:00:00-04:00</published><updated>2019-10-16T00:00:00-04:00</updated><author><name>Angela Horneman, Lauren Cooper</name></author><id>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-assets-and-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">When key business assets are not adequately protected from cybersecurity breaches, organizations can experience dire consequences....</summary><category term="Network Situational Awareness"/><category term="Situational Awareness"/></entry><entry><title>Managing the Risks of Ransomware</title><link href="https://www.sei.cmu.edu/blog/managing-the-risks-of-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-10-11T00:00:00-04:00</published><updated>2019-10-11T00:00:00-04:00</updated><author><name>David Tobar, Jason Fricke</name></author><id>https://www.sei.cmu.edu/blog/managing-the-risks-of-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Ransomware poses a growing threat to both businesses and government agencies. Though no strategy can fully eliminate these risks, this post provides recommendations....</summary><category term="Network Situational Awareness"/><category term="Cyber Missions"/><category term="Best Practices in Network Security"/><category term="Situational Awareness"/></entry><entry><title>Bolstering Security with Cyber Intelligence</title><link href="https://www.sei.cmu.edu/blog/bolstering-security-with-cyber-intelligence/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-10-03T00:00:00-04:00</published><updated>2019-10-03T00:00:00-04:00</updated><author><name>Jared Ettinger, Stephen Beck</name></author><id>https://www.sei.cmu.edu/blog/bolstering-security-with-cyber-intelligence/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">A maxim for intelligence operators and military and special operations communities is "get off the X"....</summary></entry><entry><title>Situational Awareness for Cybersecurity: An Introduction</title><link href="https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-an-introduction/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-09-09T00:00:00-04:00</published><updated>2019-09-09T00:00:00-04:00</updated><author><name>Angela Horneman</name></author><id>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-an-introduction/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Situational awareness (SA) helps decision makers throughout an organization have the information and understanding available to make good decisions in the course of their work....</summary><category term="Network Situational Awareness"/><category term="Situational Awareness"/></entry><entry><title>An Analyst-Focused Approach to Network Traffic Analysis</title><link href="https://www.sei.cmu.edu/blog/an-analyst-focused-approach-to-network-traffic-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2018-11-12T00:00:00-05:00</published><updated>2018-11-12T00:00:00-05:00</updated><author><name>Geoff Sanders</name></author><id>https://www.sei.cmu.edu/blog/an-analyst-focused-approach-to-network-traffic-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Earlier this year, a team of researchers from the SEI CERT Division's Network Situational Awareness Team (CERT NetSA) released an update (3.17.0) to the System for....</summary><category term="Software and Information Assurance"/><category term="Network Traffic Analysis "/></entry><entry><title>Best Practices in Network Traffic Analysis: Three Perspectives</title><link href="https://www.sei.cmu.edu/blog/best-practices-in-network-traffic-analysis-three-perspectives/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2018-10-08T00:00:00-04:00</published><updated>2018-10-08T00:00:00-04:00</updated><author><name>Angela Horneman, Timothy Shimeall, Timur Snoke</name></author><id>https://www.sei.cmu.edu/blog/best-practices-in-network-traffic-analysis-three-perspectives/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In July of this year, a major overseas shipping company had its U.S. operations disrupted by a ransomware attack, one of the latest attacks to disrupt the daily operation of a major, multi-national organization....</summary><category term="Human-Machine Interactions"/><category term="Cyber Missions"/><category term="Best Practices in Network Security"/></entry></feed>