Wilson, S., Place, P., and Korzec, K., 2023: The Seven Virtues of Reconciling Agile and Earned Value Management (EVM). Carnegie Mellon University, Software ...
Swinton, S., and Hedges, S., 2019: Cybersecurity Governance, Part 1: 5 Fundamental Challenges. Carnegie Mellon University, Software Engineering Institute's Insights ...
Complete the form below to register and download a free online copy of SEI CERT C Coding Standard: Rules for Developing Safe, Reliable, and Secure Systems (2016 Edition). Writing secure C code helps ...
Costa, D., and Trzeciak, R., 2023: The 13 Key Elements of an Insider Threat Program. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Snoke, T., 2017: Best Practices for NTP Services. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 3, 2025, https://www ...
Costa, D., 2019: September Is National Insider Threat Awareness Month. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed November ...
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Software is vital to our country’s global competitiveness, innovation, and national security. It also ensures our modern standard of living and enables continued advances in defense, infrastructure, ...
Schmidt, D., and Robert, J., 2024: Applying Large Language Models to DoD Software Acquisition: An Initial Experiment. Carnegie Mellon University, Software Engineering ...
Nichols, B., 2020: Programmer Moneyball: Challenging the Myth of Individual Programmer Productivity. Carnegie Mellon University, Software Engineering Institute's ...
Churilla, M., VanHoudnos, N., and Beveridge, R., 2023: The Challenge of Adversarial Machine Learning. Carnegie Mellon University, Software Engineering Institute's ...
CERT/CC advisories are now part of the US-CERT National Cyber Awareness System. We provide these advisories, published by year, for historical purposes. This report details the description, impact, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results