<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Situational Awareness</title><link>http://www.sei.cmu.edu/feeds/topic/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Situational Awareness</description><atom:link href="http://www.sei.cmu.edu/blog/feeds/topic/situational-awareness/rss/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 15 Dec 2025 00:00:00 -0500</lastBuildDate><item><title>Analyzing Partially Encrypted Network Flows with Mid-Encryption</title><link>https://www.sei.cmu.edu/blog/analyzing-partially-encrypted-network-flows-with-mid-encryption/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Encrypted traffic has come to dominate network flows, which makes it difficult for traditional flow monitoring tools to maintain visibility. In this blog post we take a closer look at a new feature added to CERT’s Yet Another Flowmeter tool (YAF) to capture the attributes of encryption when it occurs after the start of the session. We call this mid-encryption.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Steven Ibarra, Mark Thomas</dc:creator><pubDate>Mon, 15 Dec 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/analyzing-partially-encrypted-network-flows-with-mid-encryption/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Dealing with Noisy Behavioral Analytics in Detection Engineering</title><link>https://www.sei.cmu.edu/blog/dealing-with-noisy-behavioral-analytics-in-detection-engineering/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post discusses a process for tuning and related work you can do to make behavioral analytics more viable in your environment, without sacrificing analytic coverage.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sean Hutchison</dc:creator><pubDate>Mon, 30 Oct 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/dealing-with-noisy-behavioral-analytics-in-detection-engineering/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Netflow in the Era of EDR and Cloud: Helicopter Parenting for Your Network</title><link>https://www.sei.cmu.edu/blog/netflow-in-the-era-of-edr-and-cloud-helicopter-parenting-for-your-network/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Despite well-defined security policies, technical safeguards, and extensive user education, people still make mistakes and adversaries still succeed. A similar situation exists in raising children.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Daniel Ruef</dc:creator><pubDate>Mon, 14 Aug 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/netflow-in-the-era-of-edr-and-cloud-helicopter-parenting-for-your-network/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>How Situational Awareness Informs Cybersecurity Operations</title><link>https://www.sei.cmu.edu/blog/how-situational-awareness-informs-cybersecurity-operations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Situational awareness (SA) helps decision makers throughout an organization have the information and understanding they need to make sound decisions about cybersecurity operations. In this blog post, I review and provide examples of how to use SA in cybersecurity operations.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nathaniel Richmond</dc:creator><pubDate>Mon, 08 Feb 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/how-situational-awareness-informs-cybersecurity-operations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category></item><item><title>Pandemic Home Security for Your Enterprise</title><link>https://www.sei.cmu.edu/blog/pandemic-home-security-for-your-enterprise/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The COVID-19 pandemic has greatly increased remote work among enterprise employees. Home-network environments are not professionally managed, so they are an appealing target for attackers. In this post, we advise how to mitigate these risks to regain a security footing.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Phil Groce, Harry Caskey</dc:creator><pubDate>Mon, 25 Jan 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/pandemic-home-security-for-your-enterprise/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Best Practices in Network Security</category></item><item><title>Remote Work: Vulnerabilities and Threats to the Enterprise</title><link>https://www.sei.cmu.edu/blog/remote-work-vulnerabilities-and-threats-to-the-enterprise/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>How has this change in the way we work altered our security posture? How has it changed our attack surface, and what should we be doing to defend it? In this blog post, I explore the answers to these questions.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Phil Groce</dc:creator><pubDate>Mon, 18 Jan 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/remote-work-vulnerabilities-and-threats-to-the-enterprise/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Best Practices in Network Security</category></item><item><title>Is Your Organization Using Cybersecurity Analysis Effectively?</title><link>https://www.sei.cmu.edu/blog/is-your-organization-using-cybersecurity-analysis-effectively/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores how organizations can effectively use cybersecurity analysis and discusses the importance of an effective incident response plan.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman</dc:creator><pubDate>Mon, 31 Aug 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/is-your-organization-using-cybersecurity-analysis-effectively/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Cybersecurity</category></item><item><title>Situational Awareness for Cybersecurity Architecture: 5 Recommendations</title><link>https://www.sei.cmu.edu/blog/situational-awareness-cybersecurity-architecture-5-recommendations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this post on situational awareness for cybersecurity, we present five recommendations for the practice of architecture in the service of cybersecurity situational awareness (SA)....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Phil Groce</dc:creator><pubDate>Mon, 13 Jul 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-cybersecurity-architecture-5-recommendations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>COVID-19 and Supply-Chain Risk</title><link>https://www.sei.cmu.edu/blog/covid-19-and-supply-chain-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Managing supply-chain risks from the new coronavirus outbreak is personally important to me. While my first concern--like everyone else's--is mitigating the direct public-health risk....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nathaniel Richmond</dc:creator><pubDate>Mon, 08 Jun 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/covid-19-and-supply-chain-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Resilience Management Model (RMM)</category><category>Supply Chains</category></item><item><title>Situational Awareness for Cyber Security Architecture: Tools for Monitoring and Response</title><link>https://www.sei.cmu.edu/blog/situational-awareness-for-cyber-security-architecture-tools-for-monitoring-and-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Visibility into the activities within assets enables network security analysts to detect network compromises. Analysts monitor these activities directly on the device....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timothy Shimeall</dc:creator><pubDate>Mon, 11 May 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-for-cyber-security-architecture-tools-for-monitoring-and-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Situational Awareness for Cybersecurity Architecture: Network Visibility</title><link>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-architecture-network-visibility/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Network compromises cannot be detected without visibility into the activities within assets. Network security analysts can view these activities in one of two places....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timur Snoke</dc:creator><pubDate>Mon, 23 Mar 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-architecture-network-visibility/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Engineering for Cyber Situational Awareness: Endpoint Visibility</title><link>https://www.sei.cmu.edu/blog/engineering-for-cyber-situational-awareness-endpoint-visibility/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this post, we aim to help network security analysts understand the components of a cybersecurity architecture, starting with how we can use endpoint information....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Phil Groce, Timur Snoke</dc:creator><pubDate>Mon, 10 Feb 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/engineering-for-cyber-situational-awareness-endpoint-visibility/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Situational Awareness for Cybersecurity: Three Key Principles of Effective Policies and Controls</title><link>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-three-key-principles-of-effective-policies-and-controls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Security measures are most effective when it is clear how assets are supposed to be used and by whom....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman</dc:creator><pubDate>Mon, 18 Nov 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-three-key-principles-of-effective-policies-and-controls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Situational Awareness</category><category>Network Situational Awareness</category></item><item><title>Network Traffic Analysis with SiLK: Profiling and Investigating Cyber Threats</title><link>https://www.sei.cmu.edu/blog/network-traffic-analysis-with-silk-profiling-and-investigating-cyber-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Cyber threats are on the rise, making it vitally important to understand what's happening on our computer networks. But the massive amount of network traffic makes this job hard....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Paul Krystosek, Timothy Shimeall, Nancy Ott</dc:creator><pubDate>Mon, 28 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/network-traffic-analysis-with-silk-profiling-and-investigating-cyber-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Traffic Analysis </category></item><item><title>Situational Awareness for Cybersecurity: Assets and Risk</title><link>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-assets-and-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>When key business assets are not adequately protected from cybersecurity breaches, organizations can experience dire consequences....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman, Lauren Cooper</dc:creator><pubDate>Wed, 16 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-assets-and-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Managing the Risks of Ransomware</title><link>https://www.sei.cmu.edu/blog/managing-the-risks-of-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Ransomware poses a growing threat to both businesses and government agencies. Though no strategy can fully eliminate these risks, this post provides recommendations....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Tobar, Jason Fricke</dc:creator><pubDate>Fri, 11 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/managing-the-risks-of-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Cyber Missions</category><category>Best Practices in Network Security</category><category>Situational Awareness</category></item><item><title>Bolstering Security with Cyber Intelligence</title><link>https://www.sei.cmu.edu/blog/bolstering-security-with-cyber-intelligence/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>A maxim for intelligence operators and military and special operations communities is "get off the X"....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jared Ettinger, Stephen Beck</dc:creator><pubDate>Thu, 03 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/bolstering-security-with-cyber-intelligence/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Situational Awareness for Cybersecurity: An Introduction</title><link>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-an-introduction/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Situational awareness (SA) helps decision makers throughout an organization have the information and understanding available to make good decisions in the course of their work....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman</dc:creator><pubDate>Mon, 09 Sep 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-an-introduction/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>An Analyst-Focused Approach to Network Traffic Analysis</title><link>https://www.sei.cmu.edu/blog/an-analyst-focused-approach-to-network-traffic-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Earlier this year, a team of researchers from the SEI CERT Division's Network Situational Awareness Team (CERT NetSA) released an update (3.17.0) to the System for....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Geoff Sanders</dc:creator><pubDate>Mon, 12 Nov 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/an-analyst-focused-approach-to-network-traffic-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Network Traffic Analysis </category></item><item><title>Best Practices in Network Traffic Analysis: Three Perspectives</title><link>https://www.sei.cmu.edu/blog/best-practices-in-network-traffic-analysis-three-perspectives/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In July of this year, a major overseas shipping company had its U.S. operations disrupted by a ransomware attack, one of the latest attacks to disrupt the daily operation of a major, multi-national organization....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman, Timothy Shimeall, Timur Snoke</dc:creator><pubDate>Mon, 08 Oct 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/best-practices-in-network-traffic-analysis-three-perspectives/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Human-Machine Interactions</category><category>Cyber Missions</category><category>Best Practices in Network Security</category></item></channel></rss>