Improvements in systems, practices, and capable personnel to enable cyber missions
Adversary cyber maneuvers against the nation’s defense networks and systems are happening at a scale and speed that outpace human ability to respond. Current analysis, threat-awareness, and workforce development practices struggle to stay ahead of rapidly evolving threats to infrastructure, networks, and data.
We build capacity through increased use of autonomy to defend the data and networks of the Department of Defense, its mission partners, and the nation’s critical infrastructure. Additionally, we work to create, prototype, and apply learning platforms to build cyber operator and analyst capability, anytime and anywhere. Our work produces tools to automate malware analysis and innovate cyber incident handling and response. We also develop and deploy situational awareness and proactive monitoring practices, aimed at increasing the flow of actionable information about vulnerabilities.
CERT researchers develop automated tools that discover and mitigate software vulnerabilities and transfer them to researchers, procurement specialists, and software vendors.
The new CERT method for validating and repairing defects found by static analysis tools helps auditors and coders address more alerts with less effort.
April 19, 2016 • Technical Report
As they constantly change network infrastructure, adversaries consistently use and update their tools. This report presents a way for researchers to begin threat analysis with those tools rather than with network or incident data alone.Download
December 01, 2012 • Technical Report
In this report, the authors define insider threats and outline current insider threat patterns and trends.Download
November 24, 2010 • Book
In this book, the authors present best practices for managing the security and survivability of people, information, technology, and facilities.Download
April 01, 2003 • Handbook
In this 2003 handbook, the authors describe different organizational models for implementing incident handling capabilities.Download