The study explores the risks and tradeoffs when adapting enterprise-IT security and zero trust principles to weapon systems.
DeCapria, D., 2025: DataOps: Towards More Reliable Machine Learning Systems. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Schmidt, D., and Sledge, C., 2016: A Naval Perspective on Open-Systems Architecture. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Cassidy, T., and CERT Insider Threat Center, T., 2018: Substance Use and Abuse: Potential Insider Threat Implications for Organizations. Carnegie Mellon University ...
The SEI is participating at the SciTech Forum 2026 ...
Critical Asset Identification (Part 1 of 20: CERT Best Practices to Mitigate Insider Threats Series)
Ruefle, R., 2017: Critical Asset Identification (Part 1 of 20: CERT Best Practices to Mitigate Insider Threats Series). Carnegie Mellon University, Software ...
5 Essential Questions for Implementing the Software Acquisition Pathway and the Tools to Tackle Them
In this webcast, Eileen Wrubel and Brigid O’Hearn discuss the launch of the Software Acquisition Go Bag. Our SEI team has helped hundreds of DoD programs deliver software-enabled capability through ...
Schmidt, D., and Robert, J., 2024: Applying Large Language Models to DoD Software Acquisition: An Initial Experiment. Carnegie Mellon University, Software Engineering ...
Sherman, M., 2024: Using ChatGPT to Analyze Your Code? Not So Fast. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed November 3 ...
Faatz, D., 2018: Best Practices for Cloud Security. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed October 22, 2025, https ...
Hughes, L., and Jackson, V., 2021: A Framework for DevSecOps Evolution and Achieving Continuous-Integration/Continuous-Delivery (CI/CD) Capabilities. Carnegie Mellon ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results