102 episodes

In these short videos, experts from the Software Engineering Institute (SEI) deliver informative snapshots of our latest research on the changing world of all things cyber. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University.

SEI Shorts Members of Technical Staff at the Software Engineering Institute

    • Technology
    • 5.0 • 1 Rating

In these short videos, experts from the Software Engineering Institute (SEI) deliver informative snapshots of our latest research on the changing world of all things cyber. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University.

    • video
    Protecting Systems Using SSH Keys

    Protecting Systems Using SSH Keys

    In this SEI Cyber Minute, Alex Corn discusses how to protect systems using Secure Shell (SSH). SSH supports keys, which provide efficiency and security benefits.

    • 1 min
    • video
    A New Path to Verifiable Confidence

    A New Path to Verifiable Confidence

    In this SEI Cyber Minute, Bobbie Stempfley explains how in our increasingly complex world, the SEI is redefining approaches to security to address the transformative technologies being adopted throughout government and industry.

    • 2 min
    • video
    Agile Pitfall in Acquisition: The Bottom of the V

    Agile Pitfall in Acquisition: The Bottom of the V

    In this SEI Cyber Minute, Suzanne Miller explains a pitfall that can occur when trying to use Agile and Lean methods when developing and implementing complex, embedded systems. In such projects, development traditionally proceeds in a model shaped like a “V,” where the completion of requirements definition, architecture, and design occurs along the left branch of the “V” and leads to implementation at the bottom point. Then, the right branch of the “V” represents verification and validation activities. The difficulty is that these projects usually reap the benefits of the iterative, incremental aspects of Agile development only during implementation, after requirements, architecture, and design work are deemed to be finished. At that point, it becomes difficult to apply the lessons learned during implementation and to make necessary changes to the work that occurred before implementation began. Suzanne Miller explains the dynamics of this pitfall, and she describes a more agile and responsive mindset that teams can use to make sure they reap the benefits of Agile and lean approaches throughout development. In addition, she shares reference material that can help interested parties learn more.

    • 3 min
    • video
    Insider Threat Mitigation, We can help!

    Insider Threat Mitigation, We can help!

    September 2019 has been designated “National Insider Threat Awareness Month.” A number of federal agencies—including the FBI, Office of the Under Secretary of Defense for Intelligence, and Department of Homeland Security—have chosen September to spotlight the risks that insiders pose to national security.

    Since 2001, the SEI’s CERT Division has been helping government, industry, and academic entities identify and mitigate insider threats. The CERT Division’s research spans multiple domains, from the technical, including an exploration of tool sets for insider threat programs, to the behavioral and organizational, including a study on positive incentives for reducing insider threat in the workplace.

    • 2 min
    • video
    Automating Alert Handling Reduces Manual Effort

    Automating Alert Handling Reduces Manual Effort

    Static analysis (SA) alerts about software code flaws require costly manual effort to validate (e.g., determine True or False) and repair.  As a result, organizations often severely limit the types of alerts they manually examine to the types of code flaws they most worry about. That approach results in a tradeoff where many True flaws may never get fixed. To make alert handling more efficient, the SEI developed and tested novel software that enables the rapid deployment of a method to classify alerts automatically and accurately. We are implementing our solution in a new version of the SEI’s SCALe – the Source Code Analysis Lab – application.

    • 3 min
    • video
    SCAIFE: An Alert Auditing Classification Prototype

    SCAIFE: An Alert Auditing Classification Prototype

    In this SEI Cyber Minute, Ebonie McNeil explains how the Source Code Analysis Integrated Framework Environment or (SCAIFE) prototype is intended to be used by developers and analysts who manually audit alerts.

    SCAIFE provides automatic alert classification using machine learning which gives a level of confidence that the alert is true or false.

    The SCAIFE prototype also enables organizations to apply formulas that prioritize static analysis alerts by using factors they care about.

    • 2 min

Customer Reviews

5.0 out of 5
1 Rating

1 Rating

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
In Her Ellement
Boston Consulting Group BCG
Acquired
Ben Gilbert and David Rosenthal
Hard Fork
The New York Times
Deep Questions with Cal Newport
Cal Newport

More by Carnegie Mellon University

Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
Make It Real
CMU Engineering
Software Engineering Institute (SEI) Webcast Series
SEI Members of Technical Staff
SEI Cyber Talks
Members of Technical Staff