- Acquisition Transformation
- Advanced Computing
- Agile
- AI-Augmented Software Engineering
- Artificial Intelligence Engineering
- Cloud Computing
- Continuous Deployment of Capability
- Cyber-Physical Systems
- Cybersecurity Center Development
- Cybersecurity Engineering
- Cyber Workforce Development
- Edge Computing
- Enterprise Risk and Resilience Management
- Insider Threat
- Model-Based Systems Engineering
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Securing AI
- Security Vulnerabilities
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
How to Align Security Requirements and Controls to Express System Threats
This blog post presents a method that combines information about security requirements, controls, and capabilities with analysis regarding cyber threats to enable more effective risk-guided system planning.
Read More•By Elias Miller, Matthew Sisk
In Cybersecurity Engineering
From Hype to Adoption: Guiding Organizations in Their AI Journey
After a flurry of initial investments in artificial intelligence, including generative and agentic AI, many organizations are facing mixed results. The SEI is examining how organizations adopt AI and what …
Read More•By Ipek Ozkaya, Anita Carleton, Erin Harper, Natalie Schieber, Robert Edman
In AI-Augmented Software Engineering
A Model-Based Approach for Software Acquisition
The Department of War (DoW) is undergoing a significant transformation in how it acquires and develops software systems. Central to this evolution is the shift from traditional document-based processes to …
Read More•By Colin Dempsey, Jerome Hugues
In Model-Based Systems Engineering
Modeling Services with Model-Based Systems Engineering (MBSE)
This post explores an approach to designing services using model-based systems engineering (MBSE) with OMG’s Unified Architecture Framework (UAF).
Read More•By Nataliya Shevchenko, Greg Shevchenko
In Model-Based Systems Engineering
Radio-Frequency Attacks: Securing the OSI Stack
This blog post reviews common radio frequency attacks and investigates how software and cybersecurity play key roles in these exploitations.
Read More•By Joseph McIlvenny
In Cyber-Physical Systems
What’s New in SSVC: Build, Explore, and Evolve Your Decision Models
Recent updates to the Stakeholder-Specific Vulnerability Categorization (SSVC) framework help different stakeholders to prioritize vulnerabilities according to their distinct risk appetites.
Read More•By Bon Jin Koo, Renae Metcalf, Vijay S. Sarvepalli, Allen D. Householder
In Security Vulnerabilities
Enhancing Security with Cloud Flow Logs
The SEI has a history of support for flow log analysis, including its 2025 releases (for Azure or AWS) of open-source scripts to facilitate cloud flow log analysis. This blog …
Read More•By Timothy J. Shimeall
In Cybersecurity Engineering
5 Essential Questions for Implementing the Software Acquisition Pathway and the Tools to Tackle Them
This post outlines 5 essential questions to ask before implementing the Software Acquisition Pathway (SWP) and an SEI toolset to assist in the effort.
Read More•By Eileen Wrubel, Rita C. Creel, Brigid O'Hearn
In Acquisition Transformation
A Call to Action: Building a Foundation for Model-Based Systems Engineering in Digital Engineering
The SEI brought together stakeholders who have been engaging and actively innovating in the dynamic environment of digital engineering. This blog post highlights calls to action for future work in …
Read More•By Peter Capell, Will Hayes, Jerome Hugues, Nataliya Shevchenko
In Model-Based Systems Engineering
My AI System Works…But Is It Safe to Use?
This blog post introduce System Theoretic Process Analysis (STPA), a hazard analysis technique uniquely suitable for dealing with the complexity of AI systems.
Read More•By David Schulker, Matthew Walsh, Emil Mathew
In Artificial Intelligence Engineering
Explore Topics
- Acquisition Transformation
- Advanced Computing
- Agile
- AI-Augmented Software Engineering
- Artificial Intelligence Engineering
- Cloud Computing
- Continuous Deployment of Capability
- Cyber-Physical Systems
- Cybersecurity Center Development
- Cybersecurity Engineering
- Cyber Workforce Development
- Edge Computing
- Enterprise Risk and Resilience Management
- Insider Threat
- Model-Based Systems Engineering
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Securing AI
- Security Vulnerabilities
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
Get updates on our latest work.
Sign up to have the latest post sent to your inbox weekly.
Subscribe Get our RSS feedGet updates on our latest work.
Each week, our researchers write about the latest in software engineering, cybersecurity and artificial intelligence. Sign up to get the latest post sent to your inbox the day it's published.
Subscribe Get our RSS feed