News

CERT Division at Carnegie Mellon University's Software Engineering Institute. He has supported national security efforts for over 10 years in civilian, military, and contractor roles. Before joining ...
Giobbi, R., 2008: Ping Sweeping in IPv6. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed September 3, 2025, https://www.sei.cmu ...
In this webcast, SEI AI researcher Dan Justice and NVDIA Senior Technical Marketing Engineer Monica VanDieren discuss why HPC and AI skills are no longer optional for quantum professionals and explore ...
This collection contains resources about the Architecture Tradeoff Analysis Method (ATAM), a method for evaluating software architectures against quality attribute goals. The Architecture Tradeoff ...
CERT/CC advisories are now part of the US-CERT National Cyber Awareness System. We provide these advisories, published by year, for historical purposes. This report details the description, impact, ...
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Morrow, T., and Nicolai, M., 2022: The Zero Trust Journey: 4 Phases of Implementation. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
This book offers specific guidance and countermeasures on insider threat that can be immediately applied within any private, government, or military organization. Since 2001, the CERT® Insider Threat ...
Dormann, W., 2016: Windows 10 Cannot Protect Insecure Applications Like EMET Can. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Sible, J., and Svoboda, D., 2022: Rust Software Security: A Current State Assessment. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Sarvepalli, V., 2023: UEFI: 5 Recommendations for Securing and Restoring Trust. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Write secure C and C++ code—and avoid the software defects most likely to cause exploitable vulnerabilities! Straight from the world-renowned security experts at CERT/CC, Secure Coding in C and C++ ...