- Acquisition Transformation
- Advanced Computing
- Agile
- AI-Augmented Software Engineering
- Artificial Intelligence Engineering
- Cloud Computing
- Continuous Deployment of Capability
- Cyber-Physical Systems
- Cybersecurity Center Development
- Cybersecurity Engineering
- Cyber Workforce Development
- Edge Computing
- Enterprise Risk and Resilience Management
- Insider Threat
- Model-Based Systems Engineering
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Securing AI
- Security Vulnerabilities
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
Assessing the Feasibility and Advisability of a Civilian Cybersecurity Reserve
This post highlights recent work by SEI researchers on behalf of the Department of War to assess the feasibility and advisability of a civilian cybersecurity reserve.
Read More•By Marie Baker
In Cyber Workforce Development
The Five Pillars of Software Assurance in System Acquisition
This post presents five foundational capabilities to support the acquisition of a system with effective software assurance.
Read More•By Dr. Carol Woody, Christopher J. Alberts, Michael S. Bandor, Timothy A. Chick
In Secure Development
An Approach to Accelerate Verification and Software Standards Testing with LLMs
This post highlights the work of SEI researchers who sought to prove that LLMs can be used in unclassified environments to rapidly develop tools that could then be used to …
Read More•By Ryan Karl, Yash Hindka, Shen Zhang, John E. Robert
In AI-Augmented Software Engineering
From Concept to Practice: How SSVC Has Evolved to Make Adoption Possible
This post traces the milestones of the Stakeholder Specific Vulnerability Categorization and invites the community to participate, contribute, and benefit from the continued maturation of SSVC.
Read More•By Renae Metcalf, Allen D. Householder, Vijay S. Sarvepalli
In Security Vulnerabilities
An Open Source Tool to Unravel UEFI and its Vulnerabilities
This post introduces CERT UEFI Parser, a new, open source tool that uses program analysis to reveal the architecture of UEFI software, and explore this veiled source of vulnerabilities.
Read More•By Vijay S. Sarvepalli, Renae Metcalf, Cory Cohen
In Reverse Engineering for Malware Analysis
Upskilling the Federal Cybersecurity Workforce
This post details how the SEI Cyber Mission Readiness Team, in partnership with CISA, developed a series of Skilling Continuation Labs to provide unique, hands-on, immersive training to upskill the …
Read More•By Christopher Herr
In Cyber Workforce Development
The Top 10 Blog Posts of 2025
Every January on the SEI Blog, we present the 10 most-visited posts from the previous year.
Read More•By Thomas A. Longstaff
In Software Engineering Research and Development
Analyzing Partially Encrypted Network Flows with Mid-Encryption
Encrypted traffic has come to dominate network flows, which makes it difficult for traditional flow monitoring tools to maintain visibility. In this blog post we take a closer look at …
Read More•By Steven Ibarra, Mark Thomas
In Situational Awareness
Tailoring 9 Zero Trust and Security Principles to Weapon Systems
Our latest post outlines how 9 zero trust and security principles might apply to weapon systems.
Read More•By Christopher J. Alberts, Timothy Morrow, Rhonda Brown, Charles M. Wallen
In Secure Development
AI-Powered Memory Safety with the Pointer Ownership Model
This post highlights work to automate C Code Security with AI-Powered memory safety.
Read More•By David Svoboda, Lori Flynn
In Secure Development
Explore Topics
- Acquisition Transformation
- Advanced Computing
- Agile
- AI-Augmented Software Engineering
- Artificial Intelligence Engineering
- Cloud Computing
- Continuous Deployment of Capability
- Cyber-Physical Systems
- Cybersecurity Center Development
- Cybersecurity Engineering
- Cyber Workforce Development
- Edge Computing
- Enterprise Risk and Resilience Management
- Insider Threat
- Model-Based Systems Engineering
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Securing AI
- Security Vulnerabilities
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
Get updates on our latest work.
Sign up to have the latest post sent to your inbox weekly.
Subscribe Get our RSS feedGet updates on our latest work.
Each week, our researchers write about the latest in software engineering, cybersecurity and artificial intelligence. Sign up to get the latest post sent to your inbox the day it's published.
Subscribe Get our RSS feed