<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url><loc>https://www.sei.cmu.edu/blog/the-dangers-of-windows-autorun/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/who-has-my-cookies/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/is-your-adobe-flash-player-updated/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/activex-vulnerability-discovery-at-the-certcc/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/safely-using-package-managers/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/carpet-bombing-and-directory-poisoning/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/ping-sweeping-in-ipv6/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/reported-vulnerability-in-cert-secure-coding-standards-website/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/filtering-icmpv6-using-host-based-firewalls/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/recommendations-to-vendors-for-communicating-product-security-information/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/reference-implementations-for-securing-your-web-browser-guidelines/</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/internet-explorer-vulnerability-attack-vectors/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/windows-installer-application-resiliency/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/confickerc-how-many-are-there/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/bypassing-firewalls-with-ipv6-tunnels/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/release-of-dranzer-activex-fuzzing-tool/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/vulnerabilities-and-attack-surface/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/mitigating-slowloris/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/internet-explorer-kill-bits/</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/managing-ipv6-part-1/</loc><lastmod>2026-02-03</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/managing-ipv6-part-2/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/plain-text-email-in-outlook-express/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/top-10-top-level-and-second-level-domains-found-in-malicious-software/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cert-basic-fuzzing-framework/</loc><lastmod>2026-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/study-of-malicious-domain-names-tld-distribution/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/welcome-to-the-insider-threat-blog/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-deep-dive-it-sabotage/</loc></url><url><loc>https://www.sei.cmu.edu/blog/cert-basic-fuzzing-framework-update/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-threat-centric-approach-to-detecting-and-preventing-insider-threat/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/interesting-insider-threat-statistics/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/upcoming-insider-threat-presentations/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-case-trends-for-employee-type-and-employment-status/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-case-trends-of-technical-and-non-technical-employees/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/advancing-the-scope-impact-of-sei-research/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/blog-reorganization/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/learning-a-portfolio-based-checker-for-provenance-similarity-of-binaries/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/network-monitoring-for-web-based-threats-released/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/new-upcoming-sei-research-initiatives/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-in-the-software-development-lifecycle/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/strategic-planning-with-critical-success-factors-and-future-scenarios/</loc><lastmod>2023-06-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/announcing-the-cert-basic-fuzzing-framework-20/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/regression-verification-of-real-time-embedded-software/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-framework-for-evaluating-common-operating-environments/</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-new-approach-to-modeling-malware-using-sparse-representation/</loc><lastmod>2023-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/fuzzy-hashing-techniques-in-applied-malware-analysis/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-new-approach-for-handheld-devices-in-the-military/</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-best-practices-from-industry/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/what-is-agile/</loc><lastmod>2023-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/building-a-foundation-for-agile-to-enable-rapid-change/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-publications-from-the-sei/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-security-comparison-microsoft-office-vs-oracle-openoffice/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/ensuring-safety-in-cyber-physical-systems/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/enabling-agility-by-strategically-managing-architectural-technical-debt/</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/measuring-the-impact-of-explicit-architecture-documentation/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-and-physical-security-of-organizations/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/lean-principles-and-software-architecture-categories-of-waste/</loc><lastmod>2021-10-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-series-on-four-overarching-themes-across-acquisition-programs-first-theme-misaligned-incentives/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/effectiveness-of-microsoft-office-file-validation/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/improving-the-accuracy-of-early-cost-estimates-for-software-reliant-systems-first-in-a-two-part-series/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-need-to-sell-the-program-second-in-a-four-part-series-exploring-themes-across-acquisition-programs/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/lean-principles-and-software-architecture-the-waste-of-waiting/</loc><lastmod>2021-10-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/signed-java-and-cisco-anyconnect/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-new-approach-for-developing-cost-estimates-in-software-reliant-systems-second-in-a-two-part-series/</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cloud-computing-for-the-battlefield/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-importance-of-safety-and-security-related-requirements-first-of-a-three-part-series/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-deep-dive-theft-of-intellectual-property/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-the-latest-research-from-the-sei/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-evolution-of-science-projects-third-in-a-four-part-series-exploring-themes-across-acquisition-programs/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/obstacles-in-engineering-safety-and-security-related-requirements-second-in-a-three-part-series/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/theft-of-intellectual-property-and-tips-for-prevention/</loc><lastmod>2023-05-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/improving-data-quality-through-anomaly-detection/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/lean-principles-and-software-architecture-the-waste-of-information-transformation/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-growing-importance-of-sustaining-software-for-the-dod-part-1/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/protecting-against-insider-threats-with-enterprise-architecture-patterns/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-growing-importance-of-sustaining-software-for-the-dod-part-2/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-cert-insider-threat-database/</loc><lastmod>2023-05-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-infrastructure-and-joint-programs-fourth-in-a-series/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/empowering-the-smart-grid-transformation/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/using-machine-learning-to-detect-malware-similarity/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/challenges-in-network-monitoring-above-the-enterprise/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-collaborative-method-for-engineering-safety-and-security-related-requirements/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/developing-architecture-centric-engineering-within-tsp/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/using-tsp-to-architect-a-new-trading-system/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/measures-for-managing-operational-resilience/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/measures-for-managing-operational-resilienece/</loc><lastmod>2024-02-14</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/data-exfiltration-and-output-devices-an-overlooked-threat/</loc></url><url><loc>https://www.sei.cmu.edu/blog/fuzzy-hashing-against-different-types-of-malware/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/toward-safe-optimization-of-cyber-physical-systems/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/bridging-the-valley-of-disappointment-for-dod-software-research-with-spruce/</loc><lastmod>2026-03-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cloud-computing-at-the-tactical-edge/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-controls/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/equipping-the-soldier-with-end-user-programming/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/using-predictive-modeling-in-software-development-results-from-the-field/</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/preparing-for-negative-workplace-events-managing-employee-expectations/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-summary-of-key-sei-rd-accomplishments-in-2011/</loc><lastmod>2026-02-03</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-road-ahead-for-sei-rd-in-2012/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cname-flux/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/modeling-malware-with-suffix-trees/</loc><lastmod>2024-02-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-need-to-specify-requirements-for-off-nominal-behavior/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/developing-an-architecture-focused-measurement-framework-for-managing-technical-debt/</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-control-using-a-siem-signature-to-detect-potential-precursors-to-it-sabotage/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/using-agile-effectively-in-dod-environments/</loc><lastmod>2023-05-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/an-overview-of-the-sei-technologies-forum/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insiders-and-organized-crime/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/high-maturity-software-engineering-measurement-and-analysis/</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/toward-efficient-and-effective-software-sustainment/</loc><lastmod>2021-11-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/toward-agile-strategic-planning/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/real-time-scheduling-on-heterogenous-multicore-processors/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-cert-guide-to-insider-threats-how-to-prevent-detect-and-respond-to-information-technology-crimes-theft-sabotage-fraud/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/toward-efficient-and-effective-software-sustainment-second-in-a-series/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/improving-software-team-performance-with-tsp/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/rapid-lifecycle-development-in-an-agile-context/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/vulnerability-severity-using-cvss/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/thread-role-analysis/</loc><lastmod>2023-06-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/developing-controls-to-prevent-theft-of-intellectual-property/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cert-failure-observation-engine-10-released/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cert-linux-triage-tools-10-released/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/towards-common-operating-platform-environments/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cert-basic-fuzzing-framework-25-released/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/towards-common-operating-platform-environments-second-in-a-series/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/new-siem-signature-developed-to-address-insider-threats/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/group-context-aware-mobile-applications/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-research-reports-from-the-sei/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-cert-insider-threat-center-has-been-busy-this-spring/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/software-producibility-for-defense/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/amd-video-drivers-prevent-the-use-of-the-most-secure-setting-for-microsofts-exploit-mitigation-experience-toolkit-emet/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/quantifying-uncertainty-in-early-lifecycle-cost-estimation-quelce-an-update/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/improving-security-in-the-latest-c-programming-language-standard/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-cert-perl-secure-coding-standard/</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/applying-agile-at-scale-for-mission-critical-software-reliant-systems/</loc><lastmod>2023-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/pay-attention-are-your-company-secrets-at-risk-from-insiders/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/agile-methods-tools-techniques-and-practices-for-the-dod-community/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/vulnerability-data-archive/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/strategic-management-of-architectural-technical-debt/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/balancing-agility-and-discipline-at-scale/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cert-failure-observation-engine-20-released/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/applying-agility-to-common-operating-platform-environment-initiatives/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-1-introduction/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/improving-the-reliability-of-expert-opinion-within-early-lifecycle-cost-estimation/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-2-the-rogue-administrator/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/reducing-project-failures-by-aligning-acquisition-strategy-and-software-architecture-with-stakeholder-needs-first-in-a-series/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-3-insiders-who-exploit-cloud-vulnerabilities/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-method-framework-for-engineering-system-architectures/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-4-using-the-cloud-to-conduct-nefarious-activity/</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/reducing-project-failures-by-aligning-acquisition-strategy-and-software-architecture-with-stakeholder-needs-second-in-a-series/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-5-securing-against-cloud-related-insiders/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/java-security-manager-bypass-vulnerability/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/upcoming-appearances-by-cert-insider-threat-experts/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/rolling-out-tsp-organizational-performance-improvement-a-case-study/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-6-securing-against-other-cloud-related-insiders/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/java-7-attack-vectors-oh-my/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-report-network-profiling-using-flow-released/</loc></url><url><loc>https://www.sei.cmu.edu/blog/study-on-insider-cyber-fraud-in-financial-services-released/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-evident-in-all-industry-sectors/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/addressing-the-challenges-of-agile-with-tsp-a-case-study/</loc><lastmod>2023-05-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cert-insider-threat-center-in-the-news/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-7-seven-proposed-directions-for-research-and-two-in-detail/</loc><lastmod>2023-08-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-8-three-more-proposed-directions-for-future-research-in-detail/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-deeper-dive-into-the-method-framework-for-engineering-system-architectures/</loc><lastmod>2021-03-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-9-two-more-proposed-directions-for-future-research/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-insider-threat-awareness-virtual-roundtable-webinar/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/effectiveness-of-a-pattern-for-preventing-theft-by-insiders/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-10-conclusion/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/external-threat-analysis/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/is-your-organization-ready-for-agile-part-1/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/sei-contributes-to-a-national-supercomputing-initiative/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/reflections-on-20-years-of-software-architecture-a-presentation-by-linda-northrop/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/updates-to-cert-fuzzing-tools-bff-26-foe-201/</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/reflections-on-20-years-of-architecture-a-presentation-by-douglas-c-schmidt/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/spotlight-on-insider-threat-from-trusted-business-partners-article-revised-and-released/</loc><lastmod>2023-06-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/helping-developers-address-security-with-the-cert-c-secure-coding-standard/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-look-inside-cert-fuzzing-tools/</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/writing-effective-yara-signatures-to-identify-malware/</loc><lastmod>2023-05-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-in-state-and-local-government/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/strategic-planning-developing-business-drivers-for-performance-improvement/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/reflection-on-20-years-of-software-architecture-a-presentation-by-robert-schwanke/</loc><lastmod>2021-11-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/forking-and-joining-python-coroutines-to-collect-coverage-data/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/enabling-and-measuring-early-detection-of-insider-threats/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/fourth-edition-of-the-common-sense-guide-to-mitigating-insider-threats-is-released/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-common-sense-guide-to-mitigating-insider-threats-expanded/</loc><lastmod>2023-06-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/assessing-the-state-of-the-practice-of-cyber-intelligence/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/ultimate-architecture-enforcement-prevent-code-violations-at-code-commit-time/</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/2012-the-research-year-in-review/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-1-of-19/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-2-of-19/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/looking-ahead-the-sei-technical-strategic-plan/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-3-of-19/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-4-of-19/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/java-in-web-browser-disable-now/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-5-of-19/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-6-of-19/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/anatomy-of-java-exploits/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-7-of-19/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-8-of-19/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/reflections-in-software-architecture-presentations-by-jeromy-carriere-ian-gorton/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-9-of-19/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-10-of-19/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/building-next-generation-autonomous-systems/</loc><lastmod>2023-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-11-of-19/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-12-of-19/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-13-of-19/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-14-of-19/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/looking-ahead-the-sei-technical-strategic-plan-part-2/</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-15-of-19/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-16-of-19/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-17-of-19/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-18-of-19/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-sense-guide-to-mitigating-insider-threats-best-practice-19-of-19/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/network-profiling-using-flow/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cert-insider-threat-events-at-the-rsa-conference/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/evaluation-and-validity-for-sei-research-projects/</loc><lastmod>2024-02-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/standards-in-cloud-computing-interoperability/</loc></url><url><loc>https://www.sei.cmu.edu/blog/introduction-to-the-architecture-analysis-design-language/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/watching-domains-that-change-dns-servers-frequently/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/how-ontologies-can-help-build-a-science-of-cybersecurity/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-growth-rate-of-ip-addresses-that-are-advertised-as-usable-on-the-internet/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/is-your-organization-ready-for-agile-part-2/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/an-alternate-view-of-announced-ipv4-space/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/using-the-pointer-ownership-model-to-secure-memory-management-in-c-and-c/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-growth-of-ipv6-announcements/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-sei-blog-a-two-year-retrospective/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/second-level-domain-usage-in-2012-for-common-top-level-domains/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/common-testing-problems-pitfalls-to-prevent-and-mitigate/</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/geoip-in-your-soc-security-operations-center/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/finding-patterns-of-malicious-use-in-bulk-registrations/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/aadl-tools-leveraging-the-ecosystem/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/dont-sign-that-applet/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/controlling-the-malicious-use-of-usb-media/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/keep-calm-and-deploy-emet/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-value-of-systems-engineering/</loc><lastmod>2023-05-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/national-deployment-of-the-wireless-emergency-alerts-system/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/improving-safety-critical-systems-with-a-reliability-validation-improvement-framework/</loc><lastmod>2021-11-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-risks-of-microsoft-exchange-features-that-use-oracle-outside-in/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/jun-10-2013-situational-awareness-mashups-at-the-tactical-edge/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-new-cto-and-technical-strategy-for-the-sei/</loc><lastmod>2023-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/understanding-how-network-security-professionals-perceive-risk/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/application-virtualization-for-cloudlet-based-cyber-foraging-at-the-edge/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/forensics-software-and-oracle-outside-in/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-cctld-case-study-tv/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/aadl-in-the-medical-domain/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/an-investment-model-for-software-sustainment/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/semantic-code-analysis-for-malware-code-deobfuscation/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/attend-our-insider-threat-webinar/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-multi-dimensional-approach-to-insider-threat/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/practical-math-for-your-security-operations-part-1-of-3/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/unintentional-insider-threats-the-non-malicious-within/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/tempering-the-vulnerability-hype-cycle-with-cvss/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/assurance-cases-and-confidence/</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/domains-that-are-typos-of-other-domains/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/mining-ubuntu-for-interesting-fuzz-targets/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-strategic-approach-to-software-assurance/</loc><lastmod>2023-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/seven-ways-insider-threat-products-can-protect-your-organization/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/is-your-organization-ready-for-agile-part-3/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/international-considerations-for-cybersecurity-best-practices/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/towards-affordable-dod-combat-systems-in-the-age-of-sequestration/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/practical-math-for-your-security-operations-part-2-of-3/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/architecting-systems-of-the-future/</loc><lastmod>2023-05-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/deterrence-for-malware-towards-a-deception-free-internet/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/one-weird-trick-for-finding-more-crashes/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/signed-java-applet-security-improvements/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/agile-and-architecture-practices-for-rapid-delivery/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-cert-research-of-unintentional-insider-threats-social-engineering/</loc><lastmod>2023-06-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/attaching-the-rocket-to-the-chainsaw-behind-the-scenes-of-bff-and-foes-crash-recycler/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/vulnerabilities-and-attack-vectors/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/aadl-initial-foundations/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/analyzing-insider-threat-data-in-the-merit-database/</loc><lastmod>2021-03-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/addressing-the-software-engineering-challenges-of-big-data/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/working-with-the-internet-census-2012/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/bff-27-on-os-x-mavericks/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/analyzing-routing-tables/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/aadl-savi-and-beyond/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/prioritizing-malware-analysis/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/using-v-models-for-testing/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-architectural-evolution-of-dod-combat-systems/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/hacking-the-cert-foe/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/is-your-organization-ready-for-agile-part-4/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/detecting-architecture-traps-and-pitfalls-in-safety-critical-software/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/using-scenario-based-architecture-analysis-to-inform-code-quality-measures/</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/theft-of-intellectual-property-by-insiders/</loc></url><url><loc>https://www.sei.cmu.edu/blog/2013-the-research-year-in-review/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/eliminative-argumentation-a-means-for-assuring-confidence-in-safety-critical-systems/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/practical-math-for-your-security-operations-part-3-of-3/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/security-pattern-assurance-through-round-trip-engineering/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/provenance-inference-in-software/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/feeling-insecure-blame-your-parent/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/using-quality-attributes-as-a-means-to-improve-acquisition-strategies/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/differences-between-aslr-on-windows-and-linux/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/taking-control-of-linux-exploit-mitigations/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/data-analytics-for-open-source-software-assessment/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/10-years-of-flocon/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-new-approach-to-cyber-incident-response/</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-importance-of-automated-testing-in-open-systems-architecture-initiatives/</loc><lastmod>2023-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/secure-coding-for-the-android-platform/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/an-introduction-to-devops/</loc><lastmod>2023-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-new-approach-for-critical-information-systems-protection/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/why-cybersecurity-is-not-like-the-immune-system/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/unintentional-insider-threat-and-social-engineering/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/specifying-behavior-with-aadl/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/identifying-security-gaps-in-international-postal-and-transportation-infrastructure/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-new-approach-to-prioritizing-malware-analysis/</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/two-secure-coding-tools-for-analyzing-android-apps/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/secure-coding-to-prevent-vulnerabilities/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/heartbleed-qa/</loc><lastmod>2024-02-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/four-insider-it-sabotage-mitigation-patterns-and-an-initial-effectiveness-analysis-paper-released/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/needed-improved-collaboration-between-software-and-systems-engineering/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/investigating-advanced-persistent-threat-1/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-generalized-model-for-automated-devops/</loc><lastmod>2024-02-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/establishing-trust-in-the-wireless-emergency-alerts-service/</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/is-your-organization-ready-for-agile-part-5/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/android-heartbleed-testing-and-devops-an-sei-blog-mid-year-review/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/bundled-software-and-attack-surface/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/four-principles-of-engineering-scalable-big-data-software-systems/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/html5-for-mobile-software-applications-at-the-edge/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/unintentional-insider-threats-by-economic-sector/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-changing-relationship-of-systems-and-software-in-satellites-a-case-study/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-taxonomy-for-managing-operational-cybersecurity-risk/</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/principles-of-big-data-systems-you-cant-manage-what-you-dont-monitor/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/systems-engineering-in-defense-and-non-defense-industries/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/announcing-cert-tapioca-for-mitm-analysis/</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/performance-of-compiler-assisted-memory-safety-checking/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-published-research-from-the-sei/</loc><lastmod>2023-06-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/finding-android-ssl-vulnerabilities-with-cert-tapioca/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/evolutionary-improvements-of-quality-attributes-performance-in-practice/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/probable-cache-poisoning-of-mail-handling-domains/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-subversive-use-of-silk/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/eliciting-and-analyzing-unstated-requirements/</loc><lastmod>2023-05-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/agile-metrics-seven-categories/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/designing-insider-threat-programs/</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/code-generation-with-aadl-a-state-of-the-art-report/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/thread-safety-analysis-in-c-and-c/</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/smart-collection-and-storage-method-for-network-traffic-data/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/verifying-evolving-software/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/domain-blocking-the-problem-of-a-googol-of-domains/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/open-architectures-in-the-defense-intelligence-community/</loc><lastmod>2023-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-new-weekly-blog-series-to-help-organizations-adopt-implement-devops/</loc><lastmod>2023-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/devops-enhances-software-quality/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/tactical-cloudlets-moving-cloud-computing-to-the-edge/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/devops-and-agile/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/information-resilience-in-todays-high-risk-information-economy/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/vulnerability-discovery-for-emerging-networked-systems/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/what-is-devops/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/agile-software-teams-how-they-engage-with-systems-engineering-on-department-of-defense-acquisition-programs/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/malware-analysis-acquisition-strategies-network-situational-awareness-cyber-risk-the-latest-research-from-the-sei/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/security-in-continuous-integration/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/java-zero-day-vulnerabilities/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/devops-technologies-vagrant/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/domain-name-parking/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/managing-model-complexity/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/vulnerability-coordination-and-concurrency-modeling/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/devops-and-your-organization-where-to-begin/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-2014-year-in-review-top-10-blog-posts/</loc><lastmod>2024-02-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/new-technical-report-discusses-the-regional-use-of-social-networking-tools/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/supply-chain-and-external-dependencies-risk-management/</loc><lastmod>2023-05-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/whats-different-about-vulnerability-analysis-and-discovery-in-emerging-networked-systems/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/blocklist-ecosystem-analysis/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/is-your-organization-ready-for-agile-part-6/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/devops-and-docker/</loc><lastmod>2024-02-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/software-assurance-social-networking-tools-insider-threat-and-risk-analysis-the-latest-research-from-the-sei/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/development-with-docker/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/continuous-integration-in-devops/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/chatops-in-the-devops-team/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/incorporating-verified-design-by-contract-into-psp/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/devops-case-study-amazon-aws/</loc><lastmod>2024-02-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/developing-a-software-library-for-graph-analytics/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/devops-networking-solutions/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-five-year-technical-strategic-plan-for-the-sei/</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cant-buy-me-devops/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/resilience-metrics-sustainment-and-software-assurance-the-latest-research-from-the-sei/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/aadl-four-real-world-perspectives/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-establishing-an-insider-threat-program-part-1-of-18/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/addressing-the-detrimental-effects-of-context-switching-with-devops/</loc><lastmod>2023-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/data-driven-software-assurance/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-key-elements-of-an-insider-threat-program-part-2-of-18/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-risks-of-ssl-inspection/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/an-enhanced-tool-for-securing-android-apps/</loc><lastmod>2024-01-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-the-formalized-program-part-3-of-18/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/baseline-network-flow-examples/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/devops-technologies-fabric-or-ansible/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/four-types-of-shift-left-testing/</loc><lastmod>2023-04-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-participation-of-business-areas-part-4-of-18/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/an-introduction-to-the-mission-thread-workshop/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-oversight-of-program-compliance-and-effectiveness-part-5-of-18/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/build-devops-tough/</loc><lastmod>2023-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/top-10-certcc-blog-posts-on-vulnerabilities-and-ssl-tools/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-integration-with-enterprise-risk-management-6-of-18/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/top-10-insider-threat-posts/</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-prevention-detection-and-response-part-7-of-18/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/devops-technologies-gauntlt/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/heartbleed-and-goto-fail-two-case-studies-for-predicting-software-assurance-using-quality-and-reliability-measures/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-training-and-awareness-part-8-of-18/</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/information-technology-systems-modernization/</loc><lastmod>2024-02-14</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-confidential-reporting-part-9-of-18/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/devops-case-study-netflix-and-the-chaos-monkey/</loc><lastmod>2023-04-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/designing-security-into-software-reliant-systems/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-trusted-business-partners-part-10-of-18/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/model-driven-engineering-automatic-code-generation-and-beyond/</loc><lastmod>2023-04-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-data-collection-and-analysis-part-11-of-18/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/devops-in-government-where-to-start/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/resilience-model-driven-engineering-software-quality-and-android-app-analysis-the-latest-research-from-the-sei/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-incident-response-planning-part-12-of-18/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/applying-the-12-agile-principles-in-the-department-of-defense/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-communicating-insider-threat-events-part-13-of-18/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-missing-metrics-of-devops/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-spruce-series-challenges-to-managing-operational-resilience/</loc><lastmod>2023-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-policies-procedures-and-practices-part-14-of-18/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-spruce-series-9-recommended-practices-for-managing-operational-resilience/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-benefits-of-high-frequency-testing/</loc><lastmod>2023-06-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/making-yaf-app-labels-from-text-based-snort-rules/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/aircraft-systems-three-principles-for-mitigating-complexity/</loc><lastmod>2023-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-protection-of-employee-civil-liberties-and-privacy-rights-part-15-of-18/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/domain-blocklist-ecosystem-a-case-study/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/yaf-app-label-signature-context-with-analysis-pipeline/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/aadl-code-generation-for-avionics-systems/</loc><lastmod>2023-05-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-the-insider-threat-framework-part-16-of-18/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/container-security-in-devops/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-spruce-series-recommended-practices-in-the-software-development-of-safety-critical-systems/</loc><lastmod>2023-06-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-implementation-planning-part-17-of-18/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-spruce-series-8-recommended-practices-in-the-software-development-of-safety-critical-systems/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/like-nailing-jelly-to-the-wall-difficulties-in-defining-zero-day-exploit/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/intp-series-conclusion-and-resources-part-18-of-18/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/fabric-ansible-docker-and-chaos-monkey-the-devops-mid-year-review/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/testing-agile-metrics-fuzzy-hashing-android-and-big-data-the-sei-blog-mid-year-review-top-10-posts/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-risks-of-disabling-the-windows-uac/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/handling-threats-from-disgruntled-employees/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/context-aware-computing-in-the-dod/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/comments-on-bis-wassenaar-proposed-rule/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/devops-qa-frequently-asked-questions/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-field-study-of-technical-debt/</loc><lastmod>2023-05-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/10-recommended-practices-for-achieving-agile-at-scale/</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/sei-unveils-a-new-blogging-platform/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/reach-out-and-mail-someone/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/three-challenges-to-documentation-for-devops-teams/</loc><lastmod>2024-02-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/instant-karma-might-still-get-you/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-pharos-framework-binary-static-analysis-of-object-oriented-code/</loc><lastmod>2023-05-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/recent-conference-presentations-by-the-vulnerability-analysis-team/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/devops-for-contractors/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-sei-technical-strategic-plan/</loc><lastmod>2024-02-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-taxonomy-of-testing/</loc><lastmod>2021-03-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cvss-and-the-internet-of-things/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-devops-a-day-keeps-the-auditors-away-and-helps-organizations-stay-in-compliance-with-federal-regulations-such-as-sarbanes-oxley/</loc><lastmod>2021-03-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/agile-architecture-fault-analysis-the-bis-wassenaar-rule-and-computer-network-design-the-latest-research-from-the-sei/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/managing-software-complexity-in-models/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/applying-devops-principles-in-incident-response/</loc><lastmod>2021-03-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/prioritizing-alerts-from-static-analysis-to-find-and-fix-code-flaws/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/visualizing-cert-bff-string-minimization/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/who-needs-to-exploit-vulnerabilities-when-you-have-macros/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/helping-large-government-programs-adopt-and-adapt-to-agile-methods/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/mitigating-insider-incidents-with-threat-indicator-standardization/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/using-quality-metrics-and-security-methods-to-predict-software-assurance/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-frequency-and-impact-of-insider-collusion/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/responding-to-new-federal-requirements-for-contractors/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/got-technical-debt-track-technical-debt-to-improve-your-development-practices/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/bypassing-application-whitelisting/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/top-10-sei-blog-posts-of-2016/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-naval-perspective-on-open-systems-architecture/</loc><lastmod>2022-01-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/fabric-ansible-gauntlt-and-chaos-monkey-the-top-10-devops-posts-of-the-first-six-months-of-2016/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/emfta-an-open-source-tool-for-fault-tree-analysis/</loc><lastmod>2023-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/malicious-insiders-in-the-workplace-series-how-does-an-insiders-gender-relate-to-the-type-of-incident-part-1-of-4/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/prototyping-for-developing-big-data-systems/</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/building-an-insider-threat-program-five-important-categories-of-tools-part-1-of-2/</loc><lastmod>2023-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/building-an-insider-threat-program-some-low-cost-tools-part-2-of-2/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/sei-researchers-provide-congressional-testimony-on-social-security/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-risks-of-google-sign-in-on-ios-devices/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/malicious-insiders-in-the-workplace-series-what-positions-do-malicious-insiders-hold-part-2-of-4/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/early-software-vulnerability-detection-with-technical-debt/</loc></url><url><loc>https://www.sei.cmu.edu/blog/malicious-insiders-in-the-workplace-series-what-do-malicious-insiders-get-paid-part-3-of-4/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/whitebox-monitoring-with-prometheus/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/addressing-the-shortfall-of-secure-software-developers-through-community-college-education/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/malicious-insiders-in-the-workplace-series-malicious-insiders-salaries-and-the-financial-impact-of-insider-incidents-part-4-of-4/</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/real-time-extraction-of-biometric-data-from-video/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-future-of-managing-technical-debt/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/data-science-blacklists-and-mixed-critical-software-the-latest-research-from-the-sei/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-deep-dive-on-it-sabotage-updated-statistics-part-1-of-2/</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/modeling-and-simulation-in-insider-threat/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-deep-dive-on-it-sabotage-lessons-for-organizations-part-2-of-2/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/three-strategies-to-minimize-the-implementation-dip-in-devops/</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/traffic-analysis-for-network-security-two-approaches-for-going-beyond-network-flow-data/</loc><lastmod>2023-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/secure-coding-in-c11-and-c14/</loc><lastmod>2024-02-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cvd-series-what-is-coordinated-vulnerability-disclosure-part-1-of-9/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-dark-web-and-insider-threat/</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/why-netflow-data-still-matters/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cvd-series-principles-of-coordinated-vulnerability-disclosure-part-2-of-9/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/announcing-cert-basic-fuzzing-framework-version-28/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/verifying-distributed-adaptive-real-time-systems/</loc><lastmod>2024-02-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/vagrant-box-wrangling/</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/resilience-secure-coding-data-science-insider-threat-and-scheduling-the-latest-research-from-the-sei/</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/seven-principles-for-software-assurance/</loc><lastmod>2023-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/security-modeling-tools/</loc><lastmod>2024-02-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-dyn-attack-who-participated-who-was-impacted/</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cyber-threat-modeling-an-evaluation-of-three-methods/</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/windows-10-cannot-protect-insecure-applications-like-emet-can/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/distributed-denial-of-service-attacks-four-best-practices-for-prevention-and-response/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/an-introduction-to-secure-devops-including-security-in-the-software-lifecycle/</loc><lastmod>2023-05-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cybersecurity-engineering-performance-risk-and-secure-coding-the-latest-work-from-the-sei/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/why-did-the-robot-do-that/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/verifying-software-with-timers-and-clocks-stacs/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/sentiment-analysis-in-the-context-of-insider-threat/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/defending-against-phishing/</loc><lastmod>2023-04-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/autonomy-robotics-verification-ddos-attacks-and-software-testing-the-top-10-posts-of-2016/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/fabric-ansible-gauntlt-and-chaos-monkey-the-top-devops-posts-of-2016/</loc><lastmod>2021-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-challenges-of-testing-in-a-non-deterministic-world/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/automated-code-repair-in-the-c-programming-language/</loc><lastmod>2023-05-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/2016-us-state-of-cybercrime-highlights/</loc><lastmod>2021-03-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/prioritizing-security-alerts-a-dod-case-study/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/preventing-ddos-attacks-scaling-agile-insider-threat-and-software-architecture-the-latest-work-from-the-sei/</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/six-best-practices-for-securing-a-robust-domain-name-system-dns-infrastructure/</loc><lastmod>2023-04-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/are-we-creating-organizational-debt/</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-secure-hello-world/</loc><lastmod>2023-06-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/five-perspectives-on-scaling-agile/</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/moving-beyond-resilience-to-prosilience/</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/establishing-trust-in-disconnected-environments/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/powered-by-mirai/</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cert-definition-of-insider-threat-updated/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/spreading-security-with-overcommit/</loc><lastmod>2023-06-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/experiences-using-ibm-watson-in-software-assurance/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/combined-arms-cyber-kinetic-operator-training/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/three-practice-areas-for-using-positive-incentives-to-reduce-insider-threat/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/best-practices-for-ntp-services/</loc></url><url><loc>https://www.sei.cmu.edu/blog/introduction-to-the-cert-best-practices-to-mitigate-insider-threats-blog-series/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/software-assurance-data-governance-and-malware-analysis-the-latest-work-from-the-sei/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/critical-asset-identification-part-1-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-twisty-maze-of-getting-microsoft-office-updates/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cert-c-secure-coding-guidelines/</loc><lastmod>2023-05-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/formalized-insider-threat-program-part-2-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/seven-recommendations-for-testing-in-a-non-deterministic-world/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/policy-and-control-documentation-and-enforcement-part-3-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/automating-design-analysis/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/suspicious-and-disruptive-behavior-monitoring-and-response-part-4-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/information-visualization-as-a-devops-monitoring-tool/</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/three-pilots-of-the-cert-software-assurance-framework/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/negative-issues-in-the-work-environment-part-5-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/best-practices-for-network-border-protection/</loc></url><url><loc>https://www.sei.cmu.edu/blog/enterprise-wide-risk-assessments-part-6-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/reference-architectures-for-big-data-systems/</loc><lastmod>2023-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/social-media-awareness-part-7-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/ransomware-best-practices-for-prevention-and-response/</loc></url><url><loc>https://www.sei.cmu.edu/blog/stress-management-and-mistake-minimization-part-8-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/six-remedies-to-employee-resistance-to-devops/</loc><lastmod>2023-04-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/machine-learning-in-cybersecurity/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/security-awareness-and-training-part-9-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/army-robotics-in-the-military/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/password-and-account-management-part-10-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/six-things-you-need-to-know-about-data-governance/</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/privileged-account-management-part-11-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/microcosm-a-secure-devops-pipeline-as-code/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/dns-blocking-a-viable-strategy-in-malware-defense/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/data-management-and-event-correlation-part-12-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-consequences-of-insecure-software-updates/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/supply-chain-risk-management-network-situational-awareness-software-architecture-and-network-time-protocol-the-latest-work-from-the-sei/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/top-10-sei-blog-posts-of-2017/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/mobile-devices-and-other-remote-access-part-13-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/how-to-think-like-an-analyst/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/fabric-ansible-amazon-aws-and-netflix-the-top-10-devops-posts-of-2017-so-far/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/establishing-baseline-behaviors-part-14-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/what-is-bitcoin-what-is-blockchain/</loc><lastmod>2023-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/separation-of-duties-and-least-privilege-part-15-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/incremental-security-hardening-the-devops-way/</loc><lastmod>2023-05-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/using-augmented-reality-to-visualize-cyber-warfare-opportunities/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cloud-service-agreements-part-16-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/institutionalizing-system-change-controls-part-17-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/multicore-and-virtualization-an-introduction/</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-cert-guide-to-coordinated-vulnerability-disclosure/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/implementing-secure-backup-and-recovery-processes-part-18-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/multicore-processing/</loc></url><url><loc>https://www.sei.cmu.edu/blog/blocking-data-exfiltration-part-19-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/pharos-binary-static-analysis-tools-released-on-github/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/employee-termination-procedure-part-20-of-20-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/coordinated-vulnerability-disclosure-ransomware-scaling-agile-and-android-app-analysis-the-latest-work-from-the-sei/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/wrap-up-of-cert-best-practices-to-mitigate-insider-threats-series/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/secure-software-updates/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/simultaneous-analysis-of-safety-and-security-of-a-critical-system/</loc><lastmod>2024-07-15</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/virtualization-via-virtual-machines/</loc><lastmod>2023-04-26</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/virtualization-via-containers/</loc><lastmod>2021-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/introduction-part-1-of-7-mitigating-risks-of-unsupported-operating-systems/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/improving-data-extraction-from-cybersecurity-incident-reports/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/define-your-organizations-risk-tolerance-part-2-of-7-mitigating-risks-of-unsupported-operating-systems/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/pursuing-an-imagined-end-state-in-software-based-capability/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/manage-your-software-inventory-part-3-of-7-mitigating-risks-of-unsupported-operating-systems/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/machine-learning-and-insider-threat/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/upgrade-retire-or-replace-unsupported-software-part-4-of-7-mitigating-risks-of-unsupported-operating-systems/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/8-at-risk-emerging-technologies/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/establish-and-maintain-whitelists-part-5-of-7-mitigating-risks-of-unsupported-operating-systems/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/multicore-and-virtualization-recommendations/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/create-a-policy-to-manage-unsupported-software-part-6-of-7-mitigating-risks-of-unsupported-operating-systems/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/blog-expands-to-cover-more/</loc><lastmod>2022-01-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/5-best-practices-to-prevent-insider-threat/</loc></url><url><loc>https://www.sei.cmu.edu/blog/summary-part-7-of-7-mitigating-risks-of-unsupported-operating-systems/</loc><lastmod>2023-06-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-3-pillars-of-enterprise-cyber-risk-management/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/five-models-of-technology-transition-to-bridge-the-gap-between-digital-natives-and-digital-immigrants/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/vulnerability-equities/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cyber-hygiene-11-essential-practices/</loc><lastmod>2023-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/automated-detection-of-information-leaks-in-mobile-devices/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/collecting-data-the-devops-way/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cyber-warfare-technical-debt-network-border-protection-and-insider-threat-the-latest-work-from-the-sei/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/announcing-the-national-insider-threat-center/</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/inference-of-memory-bounds-preventing-the-next-heartbleed/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/technical-detection-of-intended-violence-workplace-violence-as-an-insider-threat/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/announcing-insider-threat-analyst-training-from-the-cert-national-insider-threat-center/</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/agile-metrics-a-new-approach-to-oversight/</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/mapping-the-cyber-resilience-review-to-the-financial-sectors-cybersecurity-assessment-tool/</loc><lastmod>2023-05-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/governing-the-internet-of-things-iot/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/announcing-insider-threat-program-evaluator-training-from-the-cert-national-insider-threat-center/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/bitcoin-blockchain-machine-learning-and-ransomware-the-top-10-posts-of-2017/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/revealing-true-emotions-through-micro-expressions-a-machine-learning-approach/</loc></url><url><loc>https://www.sei.cmu.edu/blog/2017-us-state-of-cybercrime-highlights/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/video-summarization-using-machine-learning-to-process-video-from-unmanned-aircraft-systems/</loc></url><url><loc>https://www.sei.cmu.edu/blog/how-to-get-the-most-out-of-penetration-testing/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/efficient-and-effective-software-sustainment-of-product-line-based-systems/</loc></url><url><loc>https://www.sei.cmu.edu/blog/declaring-war-on-cyber-terrorismor-something-like-that/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cert-insider-threat-vulnerability-assessments-itva-training-course-and-itva-certificate-program/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/why-you-should-apply-agile-devops-earlier-in-the-lifecycle/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/7-considerations-for-cyber-risk-management/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/head-in-the-clouds/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/automated-assurance-of-security-policy-enforcement-in-critical-systems/</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cert-nitc-insider-threat-program-manager-certificate/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/agiledevops-best-practices-in-insider-threat-and-dynamic-design-analysis-the-latest-work-from-the-sei/</loc></url><url><loc>https://www.sei.cmu.edu/blog/why-is-measurement-so-hard/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/12-risks-threats-vulnerabilities-in-moving-to-the-cloud/</loc><lastmod>2021-05-21</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/improving-security-and-stability-by-using-devops-strategies/</loc></url><url><loc>https://www.sei.cmu.edu/blog/cryptodns-should-we-worry/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/best-practices-for-cloud-security/</loc></url><url><loc>https://www.sei.cmu.edu/blog/automatically-stealing-password-hashes-with-microsoft-outlook-and-ole/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/substance-use-and-abuse-potential-insider-threat-implications-for-organizations/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/why-does-software-cost-so-much/</loc></url><url><loc>https://www.sei.cmu.edu/blog/acm-digital-threats-research-and-practice/</loc></url><url><loc>https://www.sei.cmu.edu/blog/the-hybrid-threat-modeling-method/</loc><lastmod>2024-02-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insiders-and-their-significant-others-collusion-motive-and-concealment/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/improving-data-analysis-with-devops/</loc></url><url><loc>https://www.sei.cmu.edu/blog/test-suites-as-a-source-of-training-data-for-static-analysis-alert-classifiers/</loc><lastmod>2021-11-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/analysis-system-architecture-virtual-integration-nets-significant-savings/</loc></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-supply-chain-best-practices/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/automated-code-generation-for-future-compatible-high-performance-graph-libraries/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/gdpr-and-its-potential-impacts-for-insider-threat-programs/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/best-practices-for-cyber-intelligence-a-look-at-the-odni-cyber-intelligence-study-and-some-early-findings/</loc></url><url><loc>https://www.sei.cmu.edu/blog/announcing-cert-tapioca-20-for-network-traffic-analysis/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/building-resilient-systems-with-cybersecurity-controls-management/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/virtual-integration-blockchain-programming-and-agiledevops-the-latest-work-from-the-sei/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/acm-digital-threats-research-and-practice-and-columns/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/big-data-malware-collection-and-storage/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cybersecurity-architecture-part-1-cyber-resilience-and-critical-service/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/infrastructure-as-code-moving-beyond-devops-and-agile/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/navigating-the-insider-threat-tool-landscape/</loc></url><url><loc>https://www.sei.cmu.edu/blog/big-data-malware-preparation-and-messaging/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cache-poisoning-of-mail-handling-domains-revisited/</loc><lastmod>2021-03-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/octavea-forte-and-fair-connect-cyber-risk-practitioners-with-the-boardroom/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/agile-strategy-short-cycle-strategy-development-and-execution/</loc><lastmod>2021-03-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/assets-and-information-in-the-insider-threat-indicator-ontology/</loc></url><url><loc>https://www.sei.cmu.edu/blog/deep-learning-cyber-intelligence-managing-privacy-and-security-and-network-traffic-analysis-the-latest-work-from-the-sei/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/10-types-of-application-security-testing-tools-when-and-how-to-use-them/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/certifiable-distributed-runtime-assurance-in-cyber-physical-systems/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/4-technical-methods-for-improving-phishing-defense/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/how-to-identify-key-causal-factors-that-influence-software-costs-a-case-study/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/considerations-for-deploying-a-text-analytics-capability-for-insider-threat-mitigation-part-1-of-3/</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/security-begins-at-the-home-router/</loc></url><url><loc>https://www.sei.cmu.edu/blog/when-aslr-is-not-really-aslr-the-case-of-incorrect-assumptions-and-bad-defaults/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/introducing-the-minimum-viable-capability-strategy/</loc></url><url><loc>https://www.sei.cmu.edu/blog/foundational-research-behind-text-analytics-for-insider-threat-part-2-of-3/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/ipv6-adoption-4-questions-and-answers/</loc></url><url><loc>https://www.sei.cmu.edu/blog/decision-making-factors-for-selecting-application-security-testing-tools/</loc></url><url><loc>https://www.sei.cmu.edu/blog/improving-cybersecurity-governance-via-csf-activity-clusters/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/three-approaches-to-adding-flexibility-in-software-sustainment-contracting/</loc><lastmod>2021-04-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/life-beyond-microsoft-emet/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/challenges-facing-insider-threat-programs-and-hub-analysts-part-1-of-2/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/obsidian-a-new-more-secure-programming-language-for-blockchain/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cybersecurity-architecture-part-2-system-boundary-and-boundary-protection/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/engaging-the-csirt-community-cyber-capacity-building-on-a-global-scale/</loc><lastmod>2024-12-03</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/scope-vs-frequency-in-defining-a-minimum-viable-capability-roadmap-part-2-of-3/</loc></url><url><loc>https://www.sei.cmu.edu/blog/challenges-facing-insider-threat-programs-and-hub-analysts-part-2-of-2/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/scale-a-tool-for-managing-output-from-static-analysis-tools/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/decisions-for-sustaining-a-software-product-line/</loc></url><url><loc>https://www.sei.cmu.edu/blog/how-cert-rmm-and-nist-security-controls-help-protect-data-privacy-and-enable-gdpr-compliance-part-1-identifying-personally-identifiable-information/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/best-practices-in-network-traffic-analysis-three-perspectives/</loc><lastmod>2021-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-incident-analysis-by-sector-part-1-of-9/</loc><lastmod>2022-06-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/emerging-opportunities-in-modularity-and-open-systems-architectures-first-in-a-series/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/is-compliance-compromising-your-information-security-culture/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/ipv6-adoption-is-your-isp-ready-to-support-ipv6/</loc><lastmod>2023-05-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/classifying-industry-sectors-our-new-approach-to-an-industry-sector-taxonomy-part-2-of-9-insider-threats-across-industry-sectors/</loc><lastmod>2021-04-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cost-effective-software-security-assurance-workflows/</loc></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-in-the-federal-government-part-3-of-9-insider-threats-across-industry-sectors/</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/an-analyst-focused-approach-to-network-traffic-analysis/</loc><lastmod>2021-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/translating-between-statistics-and-machine-learning/</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/performing-text-analytics-for-insider-threat-programs-part-3-of-3/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/rapid-software-composition-by-assessing-untrusted-components/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/scoping-it-ot-together-when-assessing-an-organizations-resilience/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-in-finance-and-insurance-part-4-of-9-insider-threats-across-industry-sectors/</loc><lastmod>2022-01-21</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/towards-improving-cvss/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/dga-domains-with-ssl-certificates-why/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/path-finding-in-malicious-binaries-first-in-a-series/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/deploying-the-cert-microcosm-devsecops-pipeline-using-docker-compose-and-kubernetes/</loc></url><url><loc>https://www.sei.cmu.edu/blog/scale-v-3-automated-classification-and-advanced-prioritization-of-static-analysis-alerts/</loc><lastmod>2021-11-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/deep-learning-agile-devops-and-cloud-security-the-top-10-blog-posts-of-2018/</loc></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-in-state-and-local-government-part-5-of-9-insider-threats-across-industry-sectors/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/governance-of-a-software-product-line-complexities-and-goals/</loc></url><url><loc>https://www.sei.cmu.edu/blog/improving-assessments-for-cybersecurity-training/</loc></url><url><loc>https://www.sei.cmu.edu/blog/deep-learning-and-satellite-imagery-diux-xview-challenge/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/challenges-to-implementing-devops-in-highly-regulated-environments-first-in-a-series/</loc><lastmod>2022-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-in-information-technology-part-6-of-9-insider-threats-across-industry-sectors/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/expectations-for-implementing-devops-in-a-highly-regulated-environment-second-in-a-series/</loc></url><url><loc>https://www.sei.cmu.edu/blog/using-the-sei-cert-coding-standards-to-improve-security-of-the-internet-of-things/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/top-5-incident-management-issues/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/an-appraisal-of-the-systems-engineering-journals-treatment-of-software-over-the-last-two-decades/</loc></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-in-healthcare-part-7-of-9-insider-threats-across-industry-sectors/</loc><lastmod>2022-06-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-modern-software-factory-and-independent-vv-for-machine-learning-two-key-recommendations-for-improving-software-in-defense-systems/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/operation-cloud-hopper-case-study/</loc></url><url><loc>https://www.sei.cmu.edu/blog/towards-a-new-model-of-acquisition-product-line-architectures-for-the-dod-second-in-a-series/</loc></url><url><loc>https://www.sei.cmu.edu/blog/insider-threats-in-entertainment-part-8-of-9-insider-threats-across-industry-sectors/</loc><lastmod>2022-06-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/enabling-shift-left-testing-from-small-teams-to-large-systems/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/api-hashing-tool-imagine-that/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/securely-connecting-africa/</loc><lastmod>2024-12-03</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/how-to-use-static-analysis-to-enforce-sei-cert-coding-standards-for-iot-applications/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/business-email-compromise-operation-wire-wire-and-new-attack-vectors/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/establishing-the-pre-assessment-devops-posture-of-an-sdlc-in-a-highly-regulated-environment-third-in-a-series/</loc></url><url><loc>https://www.sei.cmu.edu/blog/a-new-scientifically-supported-best-practice-that-can-enhance-every-insider-threat-program/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/six-free-tools-for-creating-a-cyber-simulator/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-5-step-process-for-release-planning/</loc><lastmod>2021-03-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-cert-divisions-national-insider-threat-center-nitc-symposium/</loc></url><url><loc>https://www.sei.cmu.edu/blog/the-organizational-impact-of-a-modular-product-line-architecture-in-dod-acquisition-third-in-a-series/</loc><lastmod>2021-03-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-technical-architecture-for-product-line-acquisition-in-the-dod-fourth-in-a-series/</loc></url><url><loc>https://www.sei.cmu.edu/blog/managing-the-consequences-of-technical-debt-5-stories-from-the-field/</loc></url><url><loc>https://www.sei.cmu.edu/blog/the-aadl-error-library-4-families-of-system-errors/</loc></url><url><loc>https://www.sei.cmu.edu/blog/windows-event-logging-for-insider-threat-detection/</loc></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-research-from-the-sei-in-devsecops-threat-modeling-and-insider-threat/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/high-level-technique-for-insider-threat-programs-data-source-selection/</loc></url><url><loc>https://www.sei.cmu.edu/blog/after-the-cyber-resilience-review-a-targeted-improvement-plan-for-service-continuity/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/comments-on-voluntary-voting-system-guidelines-20-principles-and-guidelines/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/model-based-analysis-of-agile-development-practices/</loc></url><url><loc>https://www.sei.cmu.edu/blog/testing-concurrent-systems-concurrency-defects-testing-techniques-and-recommendations/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/keeping-an-eye-out-for-positive-risk/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/three-architecture-recommendations-for-sustainment-organizations/</loc></url><url><loc>https://www.sei.cmu.edu/blog/selecting-measurement-data-for-software-assurance-practices/</loc><lastmod>2021-05-05</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/an-application-programming-interface-for-classifying-and-prioritizing-static-analysis-alerts/</loc><lastmod>2021-11-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cybersecurity-governance-part-1-5-fundamental-challenges/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-promise-of-deep-learning-on-graphs/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/expectations-of-windows-rdp-session-locking-behavior/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/mission-thread-analysis-using-end-to-end-data-flows-part-1/</loc><lastmod>2021-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/why-software-architects-must-be-involved-in-the-earliest-systems-engineering-activities/</loc></url><url><loc>https://www.sei.cmu.edu/blog/are-you-providing-cybersecurity-awareness-training-or-education/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/vulnerability-analysis-at-the-certcc/</loc><lastmod>2026-02-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/signed-java-applet-security-worse-than-activex/</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/what-system-resilience/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/data-driven-management-of-technical-debt/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/mission-thread-analysis-using-end-to-end-data-flows-part-2/</loc><lastmod>2021-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/patterns-and-trends-in-insider-threats-across-industry-sectors-part-9-of-9-insider-threats-across-industry-sectors/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/vulnonym-stop-the-naming-madness/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cybersecurity-engineering-for-legacy-systems-6-recommendations/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-ai-deepfakes-automated-alert-handling-and-cyber-intelligence/</loc><lastmod>2024-05-15</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/september-is-national-insider-threat-awareness-month/</loc></url><url><loc>https://www.sei.cmu.edu/blog/the-dangers-of-vhd-and-vhdx-files/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-an-introduction/</loc></url><url><loc>https://www.sei.cmu.edu/blog/update-on-the-cert-guide-to-coordinated-vulnerability-disclosure/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/what-engineers-need-to-know-about-artificial-intelligence/</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/7-guidelines-for-being-a-trusted-penetration-tester/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/improving-insider-threat-detection-methods-through-software-engineering-principles/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/impacts-and-recommendations-for-achieving-modular-open-systems-architectures-fifth-post-in-a-series/</loc></url><url><loc>https://www.sei.cmu.edu/blog/helping-the-federal-government-achieve-the-cyber-advantage/</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-incident-analysis-court-outcome-observations/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/bolstering-security-with-cyber-intelligence/</loc><lastmod>2021-11-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/artificial-intelligence-in-practice-securing-your-code-using-natural-language-processing/</loc><lastmod>2024-05-15</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/managing-the-risks-of-ransomware/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/dont-play-developer-testing-roulette-how-to-use-test-coverage/</loc></url><url><loc>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-assets-and-risk/</loc></url><url><loc>https://www.sei.cmu.edu/blog/how-to-build-a-trustworthy-freelibre-linux-capable-64-bit-risc-v-computer/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/its-time-to-retire-your-unsupported-things/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/network-traffic-analysis-with-silk-profiling-and-investigating-cyber-threats/</loc><lastmod>2021-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/mapping-cyber-hygiene-to-the-nist-cybersecurity-framework/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/could-blockchain-improve-the-cybersecurity-of-supply-chains/</loc><lastmod>2021-11-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/six-best-practices-for-developer-testing/</loc></url><url><loc>https://www.sei.cmu.edu/blog/vpn-a-gateway-for-vulnerabilities/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-three-key-principles-of-effective-policies-and-controls/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/system-resilience-what-exactly-is-it/</loc><lastmod>2021-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/system-resilience-part-2-how-system-resilience-relates-to-other-quality-attributes/</loc><lastmod>2021-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/prioritizing-vulnerability-response-with-a-stakeholder-specific-vulnerability-categorization/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/ai-engineering-11-foundational-practices-for-decision-makers/</loc></url><url><loc>https://www.sei.cmu.edu/blog/measuring-resilience-in-artificial-intelligence-and-machine-learning-systems/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/achieving-the-quantum-advantage-in-software/</loc><lastmod>2023-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/4-elements-in-securing-the-telecommunications-supply-chain/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-top-10-blog-posts-of-2019/</loc><lastmod>2021-06-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/technology-trends-in-data-exfiltration/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/system-resilience-part-3-engineering-system-resilience-requirements/</loc><lastmod>2021-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-penetration-testing-artificial-intelligence-and-incident-management/</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/anti-phishing-training-is-it-working-is-it-worth-it/</loc><lastmod>2021-03-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/performing-the-devops-assessment-fourth-in-a-series/</loc></url><url><loc>https://www.sei.cmu.edu/blog/programmer-moneyball-challenging-the-myth-of-individual-programmer-productivity/</loc><lastmod>2021-05-05</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/maturing-your-insider-threat-program-into-an-insider-risk-management-program/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/system-resilience-part-4-classifying-system-resilience-techniques/</loc><lastmod>2021-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/engineering-for-cyber-situational-awareness-endpoint-visibility/</loc></url><url><loc>https://www.sei.cmu.edu/blog/comments-on-nist-ir-8269-a-taxonomy-and-terminology-of-adversarial-machine-learning/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/system-resilience-part-5-commonly-used-system-resilience-techniques/</loc><lastmod>2021-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/formalizing-devops-assessment-findings-and-crafting-recommendations-fifth-in-a-series/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/automated-code-repair-to-ensure-memory-safety/</loc></url><url><loc>https://www.sei.cmu.edu/blog/summarizing-and-searching-video-with-machine-learning/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/designing-trustworthy-ai-for-human-machine-teaming/</loc></url><url><loc>https://www.sei.cmu.edu/blog/five-reasons-the-cybersecurity-field-needs-trusted-data-sets-and-meaningful-metrics/</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/security-automation-begins-at-the-source-code/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/using-machine-learning-to-detect-design-patterns/</loc><lastmod>2024-05-15</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/functional-requirements-for-insider-threat-tool-testing/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/bridging-the-gap-between-research-and-practice/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-architecture-network-visibility/</loc></url><url><loc>https://www.sei.cmu.edu/blog/snake-ransomware-analysis-updates/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/an-introduction-to-the-cybersecurity-maturity-model-certification-cmmc/</loc><lastmod>2021-11-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/7-quick-steps-to-using-containers-securely/</loc><lastmod>2021-03-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/automatically-detecting-technical-debt-discussions-with-machine-learning/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/reviewing-formalized-devops-assessment-findings-and-crafting-recommendations-sixth-in-a-series/</loc></url><url><loc>https://www.sei.cmu.edu/blog/system-resilience-part-6-verification-and-validation/</loc><lastmod>2024-02-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/system-resilience-part-7-16-guiding-principles-for-system-resilience/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/stop-wasting-time-manage-time-as-the-limiting-resource/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/situational-awareness-for-cyber-security-architecture-tools-for-monitoring-and-response/</loc></url><url><loc>https://www.sei.cmu.edu/blog/three-risks-in-building-machine-learning-systems/</loc><lastmod>2024-05-15</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-devsecops-artificial-intelligence-and-cybersecurity-maturity-model-certification/</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cybersecurity-maturity-model-certification-cmmc-part-2-process-maturitys-role-in-cybersecurity/</loc><lastmod>2021-11-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/covid-19-and-supply-chain-risk/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/kalki-solution-for-high-assurance-software-defined-iot-security/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/detecting-mismatches-machine-learning-systems/</loc><lastmod>2024-05-15</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/latest-research-sei/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/latest-research-sei2/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/latest-research-sei3/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/latest-research-sei4/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/latest-research-sei5/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/latest-research-sei6/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/latest-research-sei7/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/latest-research-sei8/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/latest-research-sei9/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/latest-research-sei10/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/latest-research-sei11/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/latest-research-sei12/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/latest-research-sei13/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/latest-research-sei14/</loc><lastmod>2026-02-03</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/your-organization-ready-agile-part-7/</loc></url><url><loc>https://www.sei.cmu.edu/blog/common-testing-problems-pitfalls-to-prevent-and-mitigate2/</loc><lastmod>2023-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-publications-from-the-sei2/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/writing-and-delivering-final-devops-assessment-report-seventh-series/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/beyond-nist-sp-800-171-20-additional-practices-cmmc/</loc><lastmod>2021-11-21</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/architecting-service-oriented-systems/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/developing-otto-first-look/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/e-pluribus-que-identifying-vulnerability-disclosure-stakeholders/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/final-installment-7-recommended-practices-monitoring-software-intensive-system-acquisition-sisa-programs/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/how-win-friends-and-coordinate-vulnerability/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/7-recommended-practices2/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/7-recommended-practices3/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/new-sei-cert-tool-extracts-artifacts-free-text-incident-report-analysis/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/addressing-open-architecture-software-cost-estimation/</loc><lastmod>2021-06-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/structuring-chief-information-security-officer-ciso-organization/</loc><lastmod>2021-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/dont-incentivize-wrong-behaviors-agile-development/</loc></url><url><loc>https://www.sei.cmu.edu/blog/3-metrics-incentive-right-behavior-agile-development/</loc><lastmod>2021-03-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/situational-awareness-cybersecurity-architecture-5-recommendations/</loc></url><url><loc>https://www.sei.cmu.edu/blog/evaluating-post-assessment-devops-posture-eighth-series/</loc></url><url><loc>https://www.sei.cmu.edu/blog/board-diagnostics-risks-and-vulnerabilities-connected-vehicle/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/choosing-history-profile-simple-network-flow-anomaly-detection/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/vulnerability-ids-fast-and-slow/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/coordinating-vulnerabilities-iot-devices/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/border-gateway-protocol-update-metric-analysis/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/supporting-android-ecosystem/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/latest-work-sei-microservices-ransomware-and-agile-government/</loc></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-research-from-the-sei/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cybersecurity-performance-8-indicators/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-curious-case-of-the-bouncy-castle-bks-passwords/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/implications-and-mitigation-strategies-for-the-loss-of-end-entity-private-keys/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/introducing-atlas-a-prototype-for-visualizing-the-internet/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-fighting-chance-arming-the-analyst-in-the-age-of-big-data/</loc></url><url><loc>https://www.sei.cmu.edu/blog/moving-personal-data-at-work/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/coordinated-vulnerability-disclosure-for-dod-websites/</loc></url><url><loc>https://www.sei.cmu.edu/blog/mapping-the-health-insurance-portability-and-accountability-act-security-rule-to-the-cyber-resilience-review/</loc><lastmod>2021-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/exfiltration-with-ipv6-tunnels-on-windows/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/best-practices-and-considerations-in-egress-filtering/</loc><lastmod>2021-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-vectors-of-code-on-machine-learning-for-software/</loc><lastmod>2021-07-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/octave-forte-and-fair-connect-cyber-risk-practitioners-with-the-boardroom/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/open-system-architectures-when-and-where-be-closed/</loc><lastmod>2023-05-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/how-to-protect-your-high-value-assets/</loc><lastmod>2021-03-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/adversarial-ml-threat-matrix-adversarial-tactics-techniques-and-common-knowledge-of-machine-learning/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/persistent-little-ip-arent-you/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/when-is-a-vulnerability-a-safety-issue/</loc><lastmod>2024-08-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/adding-security-to-your-devops-pipeline/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/backing-from-the-cliffs-edge-minimizing-risk-with-devops/</loc><lastmod>2022-07-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/fabric-ansible-docker-and-chaos-monkey-the-top-10-devops-posts-of-2015/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/from-vagrant-to-victory/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/integrating-your-development-and-application-security-pipelines-through-devops/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/malicious-user-stories-rejection-criteria-and-the-new-business-value/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/monitoring-in-the-devops-pipeline/</loc><lastmod>2021-04-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/securitysecurity-everywhere/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/will-continuous-integration-improve-the-security-of-my-application/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/highlights-from-the-7th-annual-national-insider-threat-center-nitc-symposium-day-one/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-incidents-assets-targeted-by-malicious-insiders/</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-incidents-communication-channels/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-incidents-most-commonly-affected-devices/</loc><lastmod>2023-05-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/organizational-resilience-to-insider-threats/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/10-at-risk-emerging-technologies/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/7-recommended-practices-for-monitoring-software-intensive-system-acquisition-sisa-programs/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/8-steps-for-migrating-existing-applications-to-microservices/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-case-study-in-locating-the-architectural-roots-of-technical-debt/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-discussion-on-open-systems-architecture/</loc><lastmod>2023-05-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-platform-for-dynamic-defense-technologies/</loc></url><url><loc>https://www.sei.cmu.edu/blog/a-taxonomy-of-testing-what-based-and-when-based-testing-types/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-tool-to-address-cybersecurity-vulnerabilities-through-design/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/adding-red-to-blue-10-tactics-defenders-can-learn-from-penetration-testers/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/agile-project-management-for-information-security-continuous-monitoring-response/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/applying-threat-intelligence-to-operational-resilience-and-risk-management-frameworks/</loc><lastmod>2023-05-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/architecture-analysis-using-aadl-a-beginners-perspective/</loc></url><url><loc>https://www.sei.cmu.edu/blog/balancing-cyber-confidence-and-privacy-concerns/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/big-data-technology-selection-a-case-study/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cyber-intelligence-and-critical-thinking/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/development-of-a-master-of-software-assurance-reference-curriculum/</loc><lastmod>2023-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/empirical-evaluation-of-api-usability-and-security/</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/flow-analytics-for-cyber-situational-awareness/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/follow-the-cui-4-steps-to-starting-your-cmmc-assessment/</loc><lastmod>2021-12-01</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/improving-system-and-software-security-with-aadl/</loc><lastmod>2023-05-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/is-java-more-secure-than-c/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/is-your-organization-using-cybersecurity-analysis-effectively/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/leveraging-threat-intelligence-to-support-resilience-risk-and-project-management/</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/managing-static-analysis-alerts-with-efficient-instantiation-of-the-scaife-api-into-code-and-an-automatically-classifying-system/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/managing-the-risks-of-adopting-ai-engineering/</loc><lastmod>2024-05-15</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/migrating-applications-to-kubernetes/</loc><lastmod>2024-02-01</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/network-segmentation-concepts-and-practices/</loc><lastmod>2024-02-01</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/osa-4-best-practices-for-open-software-ecosystems/</loc></url><url><loc>https://www.sei.cmu.edu/blog/ransomware-as-a-service-raas-threats/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/second-installment-7-recommended-practices-for-monitoring-software-intensive-system-acquisition-sisa-programs/</loc><lastmod>2021-04-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/situational-analysis-software-architecture-insider-threat-threat-modeling-and-honeynets-the-latest-research-from-the-sei/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/static-identification-of-program-behavior-using-sequences-of-api-calls/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-importance-of-software-architecture-in-big-data-systems/</loc><lastmod>2023-05-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-spruce-series-the-challenges-to-acquiring-intellectual-property/</loc></url><url><loc>https://www.sei.cmu.edu/blog/the-top-10-blog-posts-of-2015-technical-debt-devops-graph-analytics-secure-coding-and-testing/</loc><lastmod>2022-06-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/threat-analysis-mapping-connected-vehicles-emerging-technologies-and-cyber-foraging-the-latest-research-from-the-sei/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/three-places-to-start-in-defending-against-ransomware/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/three-roles-and-three-failure-patterns-of-software-architects/</loc></url><url><loc>https://www.sei.cmu.edu/blog/vehicle-cybersecurity-the-jeep-hack-and-beyond/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/verifying-timing-in-undocumented-multicore-processors/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/what-ant-colonies-can-teach-us-about-securing-the-internet/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/insider-threat-latest-research-sei/</loc><lastmod>2023-06-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/latest-research-sei-2011/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/continuous-integration-devops-2015/</loc><lastmod>2023-04-26</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/machine-learning-cybersecurity-2019/</loc><lastmod>2021-03-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/shifting-software-sustainment-software-engineering-dod/</loc><lastmod>2024-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/show-me-agility-agile-strategy-execution/</loc><lastmod>2023-05-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cat-and-mouse-age-net/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/what-digital-engineering-and-how-it-related-devsecops/</loc><lastmod>2023-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/mission-based-prioritization-new-method-sequence-features-capabilities-and-epics/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/3-ransomware-defense-strategies/</loc><lastmod>2023-05-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/public-repository-data-static-analysis-classification-research/</loc><lastmod>2026-02-03</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/10-steps-managing-risk-octave-forte/</loc></url><url><loc>https://www.sei.cmu.edu/blog/release-scaife-system-version-100-provides-full-gui-based-static-analysis-adjudication-system-meta-alert-classification/</loc><lastmod>2021-11-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/benfords-law-potential-applications-insider-threat-detection/</loc><lastmod>2023-05-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/introduction-model-based-systems-engineering-mbse/</loc><lastmod>2025-11-03</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/top-10-blog-posts-2020/</loc><lastmod>2021-06-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/pandemic-home-security-for-your-enterprise/</loc><lastmod>2021-03-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/remote-work-vulnerabilities-and-threats-to-the-enterprise/</loc><lastmod>2024-02-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/six-key-cybersecurity-engineering-activities-for-building-a-cybersecurity-strategy/</loc><lastmod>2023-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/how-situational-awareness-informs-cybersecurity-operations/</loc><lastmod>2021-03-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/top-10-considerations-for-effective-incident-management-communications/</loc><lastmod>2024-12-03</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-framework-for-devsecops-evolution-and-achieving-continuous-integrationcontinuous-delivery-cicd-capabilities/</loc><lastmod>2021-03-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/benefits-and-challenges-of-soar-platforms/</loc><lastmod>2024-02-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/requirements-in-model-based-systems-engineering-mbse/</loc><lastmod>2023-06-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/how-to-use-the-cmmc-assessment-guides/</loc><lastmod>2021-12-01</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/zero-trust-adoption-managing-risk-with-cybersecurity-engineering-and-adaptive-risk-assessment/</loc><lastmod>2023-04-26</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/comparing-devsecops-and-systems-engineering-principles/</loc><lastmod>2023-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-game-to-assess-human-decision-making-with-ai-support/</loc><lastmod>2024-05-15</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/regression-verification-for-real-time-embedded-software-systems/</loc><lastmod>2021-03-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/defining-microservices/</loc><lastmod>2021-03-25</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/microservices-beyond-the-hype-what-you-gain-and-what-you-lose/</loc><lastmod>2022-04-21</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-current-state-of-devsecops-metrics/</loc><lastmod>2024-02-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-privacy-ransomware-digital-engineering-and-the-solar-winds-hack/</loc><lastmod>2021-06-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/generating-realistic-non-player-characters-for-training-cyberteams/</loc><lastmod>2023-05-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/when-your-softwares-check-engine-light-is-on-identifying-design-problems-that-impact-software-failure/</loc><lastmod>2024-03-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/automating-system-security-with-aadl-11-rules-for-ensuring-a-security-model/</loc><lastmod>2024-03-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/integrating-safety-and-security-engineering-for-mission-critical-systems/</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/aligning-devsecops-and-machine-learning/</loc><lastmod>2024-03-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/software-engineering-for-machine-learning-characterizing-and-detecting-mismatch-in-machine-learning-systems/</loc><lastmod>2024-05-15</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/taking-devsecops-to-the-next-level-with-value-stream-mapping/</loc><lastmod>2021-05-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/accelerating-safety-assurance/</loc><lastmod>2022-01-14</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/anti-tamper-for-software-components/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/potential-implications-of-the-california-consumer-privacy-act-ccpa-for-insider-risk-programs/</loc><lastmod>2024-06-25</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/certcc-comments-on-standards-and-guidelines-to-enhance-software-supply-chain-security/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/vulnerabilities-everybodys-got-one/</loc><lastmod>2021-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/process-concerns-when-navigating-the-transition-from-sustainment-to-engineering-software-reliant-systems/</loc><lastmod>2022-01-14</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/considerations-for-operator-feedback-sessions-in-government-settings/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/operator-feedback-sessions-in-a-government-setting-the-good-and-not-so-good-parts/</loc><lastmod>2022-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-artificial-intelligence-devsecops-and-security-incident-response/</loc><lastmod>2023-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/architecting-the-future-of-software-engineering-a-research-and-development-roadmap/</loc><lastmod>2023-04-26</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/agile-metrics-assessing-progress-to-plans/</loc><lastmod>2022-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/safety-assurance-does-not-provide-software-assurance/</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/dns-over-https-3-strategies-for-enterprise-security-monitoring/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/navigating-people-concerns-when-transitioning-from-sustainment-to-engineering-software-reliant-systems/</loc><lastmod>2021-08-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/translating-the-risk-management-framework-for-nonfederal-organizations/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/5-ways-to-start-growing-an-ai-ready-workforce/</loc><lastmod>2022-01-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-coordinated-vulnerability-disclosure-cybersecurity-research-cyber-risk-and-resilience-and-the-importance-of-fostering-diversity-in-software-engineering/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/introducing-cert-kaiju-malware-analysis-tools-for-ghidra/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/systems-engineering-and-software-engineering-collaborating-for-the-smart-systems-of-the-future/</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/system-end-of-life-planning-designing-systems-for-maximum-resiliency-over-time/</loc><lastmod>2021-09-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-role-of-devsecops-in-continuous-authority-to-operate/</loc><lastmod>2021-10-04</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-technique-for-decompiling-binary-code-for-software-assurance-and-localized-repair/</loc><lastmod>2021-10-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/ghihorn-path-analysis-in-ghidra-using-smt-solvers/</loc><lastmod>2024-02-01</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/release-of-scaife-system-version-200-provides-support-for-continuous-integration-ci-systems/</loc><lastmod>2024-05-15</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/two-tools-for-malware-analysis-and-reverse-engineering-in-ghidra/</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/11-leading-practices-when-implementing-a-container-strategy/</loc><lastmod>2021-11-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/from-model-based-systems-and-software-engineering-to-moddevops/</loc><lastmod>2022-01-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/software-engineering-as-a-strategic-advantage-a-national-roadmap-for-the-future/</loc><lastmod>2021-11-15</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/operating-at-the-edge/</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/some-challenges-in-making-the-transition-to-digital-engineering/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/technical-issues-in-navigating-the-transition-from-sustainment-to-engineering-software-reliant-systems/</loc><lastmod>2021-12-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/toward-technical-reference-frameworks-to-support-large-scale-systems-of-systems/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/top-10-blog-posts-of-2021/</loc><lastmod>2022-02-14</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/what-is-explainable-ai/</loc><lastmod>2024-02-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/how-do-you-trust-ai-cybersecurity-devices/</loc><lastmod>2023-08-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-cybersecurity-engineering-strategy-for-devsecops-that-integrates-with-the-software-supply-chain/</loc><lastmod>2023-04-26</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/six-acquisition-pathways-for-large-scale-complex-systems/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/two-categories-of-architecture-patterns-for-deployability/</loc><lastmod>2022-06-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-hitchhikers-guide-to-ml-training-infrastructure/</loc><lastmod>2022-02-21</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-the-future-of-software-engineering-ethical-ai-cloud-adoption-and-machine-learning/</loc><lastmod>2022-03-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-model-based-tool-to-assist-in-the-design-of-safety-critical-systems/</loc><lastmod>2022-03-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/how-easy-is-it-to-make-and-detect-a-deepfake/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/containerization-at-the-edge/</loc><lastmod>2023-06-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/creating-a-proposal-for-virtual-prototyping-in-7-steps/</loc><lastmod>2022-03-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/internet-of-things-iot-security-at-the-edge/</loc><lastmod>2022-05-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/using-machine-learning-to-increase-the-fidelity-of-non-player-characters-in-training-simulations/</loc><lastmod>2022-04-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-case-study-in-applying-digital-engineering/</loc><lastmod>2023-06-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/improving-automated-retraining-of-machine-learning-models/</loc><lastmod>2024-05-15</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/security-analytics-tracking-proxy-bypass/</loc><lastmod>2022-06-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-method-for-assessing-cloud-adoption-risks/</loc><lastmod>2022-05-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cybersecurity-capacity-building-with-human-capital-in-sub-saharan-africa/</loc><lastmod>2024-12-03</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/creating-transformative-and-trustworthy-ai-systems-requires-a-community-effort/</loc><lastmod>2022-05-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/secops-field-notes-challenges-of-assessing-international-soc-teams-during-a-global-pandemic/</loc><lastmod>2024-12-03</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/tactics-and-patterns-for-software-robustness/</loc><lastmod>2024-02-14</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/probably-dont-rely-on-epss-yet/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/modeling-devsecops-to-protect-the-pipeline/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/security-analytics-tracking-software-updates/</loc><lastmod>2022-06-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-zero-trust-journey-4-phases-of-implementation/</loc><lastmod>2023-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-the-sei-year-in-review-explainable-ai-and-digital-engineering-effectiveness/</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/combining-security-and-velocity-in-a-continuous-integration-pipeline-for-large-teams/</loc><lastmod>2022-07-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/it-ot-and-zt-implementing-zero-trust-in-industrial-control-systems/</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/uefi-terra-firma-for-attackers/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/networking-at-the-tactical-and-humanitarian-edge/</loc><lastmod>2022-08-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/taking-up-the-challenge-of-open-source-software-security-in-the-dod/</loc><lastmod>2022-08-15</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/10-years-of-research-in-technical-debt-and-an-agenda-for-the-future/</loc><lastmod>2022-08-15</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/saying-why-persona-based-metrics-with-user-stories/</loc><lastmod>2022-08-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-digital-engineering-ai-and-deepfakes/</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/how-to-grow-an-ai-ready-dod-workforce/</loc><lastmod>2022-10-06</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/using-alternate-data-streams-in-the-collection-and-exfiltration-of-data/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/vultron-a-protocol-for-coordinated-vulnerability-disclosure/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-drive-toward-stability/</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/5-issues-to-consider-when-engineering-societal-scale-systems/</loc><lastmod>2022-10-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/how-to-mitigate-insider-threats-by-learning-from-past-incidents/</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/modeling-languages-for-model-based-systems-engineering-mbse/</loc><lastmod>2024-05-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/an-acquisition-security-framework-for-supply-chain-risk-management/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-technical-devsecops-adoption-framework/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/writing-ansible-roles-with-confidence/</loc><lastmod>2022-11-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/mxnet-a-growing-deep-learning-framework/</loc><lastmod>2022-12-01</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/modeling-capabilities-with-model-based-systems-engineering-mbse/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/what-is-enterprise-technical-debt/</loc><lastmod>2023-03-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/bridging-the-gap-between-requirements-engineering-and-model-evaluation-in-machine-learning/</loc><lastmod>2023-01-05</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/rust-software-security-a-current-state-assessment/</loc><lastmod>2023-01-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/experiences-documenting-and-remediating-enterprise-technical-debt/</loc><lastmod>2022-12-21</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/mothra-network-situational-awareness-at-scale/</loc><lastmod>2023-01-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/software-modeling-what-to-model-and-why/</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-top-10-blog-posts-of-2022/</loc><lastmod>2023-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/2-approaches-to-risk-and-resilience-asset-based-and-service-based/</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/rust-vulnerability-analysis-and-maturity-challenges/</loc><lastmod>2023-01-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/play-it-again-sam-or-how-i-learned-to-love-large-language-models/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-zero-trust-devsecops-and-software-resilience/</loc><lastmod>2023-02-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-benefits-of-cyber-assessment-training/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/tackling-collaboration-challenges-in-the-development-of-ml-enabled-systems/</loc><lastmod>2023-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/5-best-practices-from-industry-for-implementing-a-zero-trust-architecture/</loc><lastmod>2026-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/software-isolation-why-it-matters-to-software-evolution-and-why-everybody-puts-it-off/</loc><lastmod>2023-03-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/how-to-use-docker-and-ns-3-to-create-realistic-network-simulations/</loc><lastmod>2023-03-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/security-analytics-using-silk-and-mothra-to-identify-data-exfiltration-via-the-domain-name-service/</loc><lastmod>2023-04-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cybersecurity-of-quantum-computing-a-new-frontier/</loc><lastmod>2024-02-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/actionable-data-from-the-devsecops-pipeline/</loc><lastmod>2023-04-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/designing-great-challenges-for-cybersecurity-competitions/</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/8-areas-of-future-research-in-zero-trust/</loc><lastmod>2026-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/process-and-technical-vulnerabilities-6-key-takeaways-from-a-chemical-plant-disaster/</loc><lastmod>2023-05-05</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-challenge-of-adversarial-machine-learning/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/how-can-causal-learning-help-to-control-costs/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/join-the-sei-and-white-house-ostp-to-explore-the-future-of-software-and-ai-engineering/</loc><lastmod>2023-05-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/detecting-and-grouping-malware-using-section-hashes/</loc><lastmod>2023-06-05</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/5-challenges-to-implementing-devsecops-and-how-to-overcome-them/</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/whats-going-on-in-my-program-12-rules-for-conducting-assessments/</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/uefi-5-recommendations-for-securing-restoring-trust/</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/latest-work-sei-rust-devsecops-ai-and-penetration-testing/</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-seven-virtues-of-reconciling-agile-and-earned-value-management/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/Using-Game-Theory-to-Advance-Cyber-Threat-Hunting/</loc><lastmod>2023-07-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/contextualizing-end-user-needs-how-to-measure-the-trustworthiness-of-an-ai-system/</loc><lastmod>2023-07-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-repository-of-common-penetration-testing-weaknesses/</loc><lastmod>2023-07-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/extending-agile-and-devsecops-to-improve-efforts-tangential-to-software-product-development/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/netflow-in-the-era-of-edr-and-cloud-helicopter-parenting-for-your-network/</loc><lastmod>2023-08-14</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/product-managements-role-in-software-a-fools-game-or-an-evolving-adventure/</loc><lastmod>2023-08-21</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/3-activities-for-making-software-secure-by-design/</loc><lastmod>2023-09-05</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-need-for-quantum-software-architecture/</loc><lastmod>2023-08-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/synergy-among-engineering-disciplines-software-cybersecurity-and-ai/</loc><lastmod>2023-09-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/harnessing-the-power-of-large-language-models-for-economic-and-social-good-foundations/</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/harnessing-the-power-of-large-language-models-for-economic-and-social-good-4-case-studies/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/application-of-large-language-models-llms-in-software-engineering-overblown-hype-or-disruptive-change/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/secure-by-design-at-cert/</loc><lastmod>2025-04-15</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/assuring-cyber-physical-systems-in-an-age-of-rising-autonomy/</loc><lastmod>2023-12-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-13-key-elements-of-an-insider-threat-program/</loc><lastmod>2023-10-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/dealing-with-noisy-behavioral-analytics-in-detection-engineering/</loc><lastmod>2023-10-30</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-sei-sbom-framework-informing-third-party-software-management-in-your-supply-chain/</loc><lastmod>2024-04-05</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-osate-slicer-fast-reachability-query-support-for-architectural-models/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/generative-ai-question-and-answer-applications-in-software-engineering/</loc><lastmod>2025-12-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/dont-wait-for-roi-on-model-based-analysis-for-embedded-computing-resources/</loc><lastmod>2024-05-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/explainability-in-cybersecurity-data-science/</loc><lastmod>2023-11-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/creating-a-large-language-model-application-using-gradio/</loc><lastmod>2023-12-05</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/applying-generative-ai-to-software-engineering-navigating-ethical-and-educational-landscapes/</loc><lastmod>2025-12-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/acquisition-archetypes-seen-in-the-wild-devsecops-edition-clinging-to-the-old-ways/</loc><lastmod>2023-12-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-top-10-blog-posts-of-2023/</loc><lastmod>2024-01-05</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei/</loc><lastmod>2024-01-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/10-benefits-and-10-challenges-of-applying-large-language-models-to-dod-software-acquisition/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-top-10-skills-cisos-need-in-2024/</loc><lastmod>2024-03-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/applying-the-sei-sbom-framework/</loc><lastmod>2026-02-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/using-chatgpt-to-analyze-your-code-not-so-fast/</loc><lastmod>2024-02-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cert-releases-2-tools-to-assess-insider-risk/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/openai-collaboration-yields-14-recommendations-for-evaluating-llms-for-cybersecurity/</loc><lastmod>2024-02-21</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/10-lessons-in-security-operations-and-incident-management/</loc><lastmod>2024-03-05</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/example-case-using-devsecops-to-redefine-minimum-viable-product/</loc><lastmod>2024-03-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/api-security-through-contract-driven-programming/</loc><lastmod>2024-03-18</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/5-recommendations-to-help-your-organization-manage-technical-debt/</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/applying-large-language-models-to-dod-software-acquisition-an-initial-experiment/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/comparing-the-performance-of-hashing-techniques-for-similar-function-detection/</loc><lastmod>2026-02-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-an-openai-collaboration-generative-ai-and-zero-trust/</loc><lastmod>2026-04-02</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-great-fuzzy-hashing-debate/</loc><lastmod>2026-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/what-recent-vulnerabilities-mean-to-rust/</loc><lastmod>2024-05-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/polar-improving-devsecops-observability/</loc><lastmod>2024-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cost-effective-ai-infrastructure-5-lessons-learned/</loc><lastmod>2026-03-04</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/measurement-challenges-in-software-assurance-and-supply-chain-risk-management/</loc><lastmod>2026-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/versioning-with-git-tags-and-conventional-commits/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-threat-of-deprecated-bgp-attributes/</loc><lastmod>2026-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/redemption-a-prototype-for-automated-repair-of-static-analysis-alerts/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/software-cost-estimation-explained/</loc><lastmod>2024-06-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/incorporating-agile-principles-into-independent-verification-and-validation/</loc><lastmod>2024-06-27</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-apis-sboms-and-static-analysis/</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cultivating-kubernetes-on-the-edge/</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/3-api-security-risks-and-recommendations-for-mitigation/</loc><lastmod>2024-07-15</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/auditing-bias-in-large-language-models/</loc><lastmod>2026-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/weaknesses-and-vulnerabilities-in-modern-ai-why-security-and-safety-are-so-challenging/</loc><lastmod>2024-08-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/improving-testing-outcomes-through-software-architecture/</loc><lastmod>2024-08-01</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/weaknesses-and-vulnerabilities-in-modern-ai-integrity-confidentiality-and-governance/</loc><lastmod>2024-08-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/weaknesses-and-vulnerabilities-in-modern-ai-ai-risk-cyber-risk-and-planning-for-test-and-evaluation/</loc><lastmod>2024-08-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/building-quality-software-4-engineering-centric-techniques/</loc><lastmod>2024-08-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/3-recommendations-for-machine-unlearning-evaluation-challenges/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/acquisition-archetypes-seen-in-the-wild-devsecops-edition-cross-program-dependencies/</loc><lastmod>2024-09-03</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/generative-ai-and-software-engineering-education/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-counter-ai-coordinated-vulnerability-disclosure-and-artificial-intelligence-engineering/</loc><lastmod>2024-09-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-roadmap-for-incorporating-positive-deterrence-in-insider-risk-management/</loc><lastmod>2025-04-03</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/measuring-ai-accuracy-with-the-ai-robustness-air-tool/</loc><lastmod>2024-10-04</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/evaluating-static-analysis-alerts-with-llms/</loc><lastmod>2024-10-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/challenges-to-assuring-large-scale-systems/</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/an-introduction-to-model-based-systems-engineering-mbse/</loc><lastmod>2024-10-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-framework-for-detection-in-an-era-of-rising-deepfakes/</loc><lastmod>2024-10-31</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/introduction-to-mlops-bridging-machine-learning-and-operations/</loc><lastmod>2024-11-04</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/an-introduction-to-hardening-docker-images/</loc><lastmod>2024-11-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/genai-for-code-review-of-c-and-java/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cyber-physical-sensing-to-extend-the-national-intelligence-surveillance-and-reconnaissance-mesh/</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/beyond-capable-accuracy-calibration-and-robustness-in-large-language-models/</loc><lastmod>2026-02-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-insider-risk-bias-in-llms-secure-coding-and-designing-secure-systems/</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-top-10-blog-posts-of-2024/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-myth-of-machine-learning-reproducibility-and-randomness-for-acquisitions-and-testing-evaluation-verification-and-validation/</loc><lastmod>2025-01-16</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/13-cybersecurity-predictions-for-2025/</loc><lastmod>2025-01-21</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/6-lessons-learned-from-hosting-the-presidents-cup-cybersecurity-competition/</loc><lastmod>2025-01-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/introducing-the-insider-incident-data-exchange-standard-iides/</loc><lastmod>2025-02-03</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cyber-informed-machine-learning/</loc><lastmod>2025-02-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/introducing-mlte-systems-approach-to-machine-learning-test-and-evaluation/</loc><lastmod>2025-02-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/protecting-ai-from-the-outside-in-the-case-for-coordinated-vulnerability-disclosure/</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/perspectives-on-generative-ai-in-software-engineering-and-acquisition/</loc><lastmod>2025-12-17</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/detection-and-repair-the-cost-of-remediation/</loc><lastmod>2025-03-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-devsecops-capability-maturity-model/</loc><lastmod>2026-01-07</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-essential-role-of-aisirt-in-flaw-and-vulnerability-management/</loc><lastmod>2025-04-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/cybersecurity-of-logistics-decision-models/</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/enhancing-machine-learning-assurance-with-portend/</loc><lastmod>2025-03-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/radio-frequency-101-can-you-really-hack-a-radio-signal/</loc><lastmod>2025-10-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/evaluating-llms-for-text-summarization-introduction/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/dataops-towards-more-reliable-machine-learning-systems/</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/10-things-organizations-should-know-about-ai-workforce-development/</loc><lastmod>2025-04-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/stop-imagining-threats-start-mitigating-them-a-practical-guide-to-threat-modeling/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-5-stage-process-for-automated-testing-and-delivery-of-complex-software-systems/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/delivering-resilient-software-capability-to-the-warfighter-at-the-speed-of-relevance/</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/out-of-distribution-detection-knowing-when-ai-doesnt-know/</loc><lastmod>2025-06-24</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/amplifying-ai-readiness-in-the-dod-workforce/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-practitioner-focused-devsecops-assessment-approach/</loc><lastmod>2026-01-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/managing-security-and-resilience-risks-across-the-lifecycle/</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/artificial-intelligence-in-national-security-acquisition-and-integration/</loc><lastmod>2025-08-05</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/7-recommendations-to-improve-sbom-quality/</loc><lastmod>2025-08-25</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/my-ai-system-worksbut-is-it-safe-to-use/</loc><lastmod>2025-09-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-call-to-action-building-a-foundation-for-model-based-systems-engineering-in-digital-engineering/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/five-essential-questions-for-implementing-the-software-acquisition-pathway/</loc><lastmod>2026-02-03</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/enhancing-security-with-cloud-flow-logs/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/whats-new-in-ssvc-build-explore-and-evolve-your-decision-models/</loc><lastmod>2026-01-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/radio-frequency-attacks-securing-the-osi-stack/</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/modeling-services-with-model-based-systems-engineering-mbse/</loc><lastmod>2025-10-29</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/a-model-based-approach-for-software-acquisition/</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/from-hype-to-adoption-guiding-organizations-in-their-ai-journey/</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/how-to-align-security-requirements-and-controls-to-express-system-threats/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/ai-powered-memory-safety-with-the-pointer-ownership-model/</loc><lastmod>2026-02-19</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/analyzing-partially-encrypted-network-flows-with-mid-encryption/</loc><lastmod>2025-12-15</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/tailoring-9-zero-trust-and-security-principles-to-weapon-systems/</loc><lastmod>2025-12-11</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-top-10-blog-posts-of-2025/</loc><lastmod>2026-01-12</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/upskilling-the-federal-cybersecurity-workforce/</loc><lastmod>2026-01-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/an-open-source-tool-to-unravel-uefi-and-its-vulnerabilities/</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/from-concept-to-practice-how-ssvc-has-evolved-to-make-adoption-possible/</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/an-approach-to-accelerate-verification-and-software-standards-testing-with-llms/</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/the-five-pillars-of-software-assurance-in-system-acquisition/</loc><lastmod>2026-03-04</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/assessing-the-feasibility-and-advisability-of-a-civilian-cybersecurity-reserve/</loc><lastmod>2026-03-10</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/from-reality-to-virtual-reality-the-impact-of-3dgs-on-training-education-and-beyond/</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/using-data-and-data-analytics-to-improve-cyber-resilience/</loc><lastmod>2026-04-20</lastmod></url><url><loc>https://www.sei.cmu.edu/blog/data-poisoning-in-ai-models-the-case-for-chain-of-custody-controls/</loc><lastmod>2026-04-27</lastmod></url>
</urlset>
