At the SEI, we research complex software engineering, cybersecurity, and AI engineering problems; create and test innovative technologies; and transition maturing solutions into practice. We have been ...
Executive Order 13587 requires federal agencies that operate or access classified computer networks to implement an insider threat detection and prevention program. Proposed changes to the National ...
Over the past decade, artificial intelligence (AI) has made remarkable strides. From deep neural networks that can identify and label objects in images, to AI systems that outperform humans in complex ...
The Software Engineering Institute is a leader in researching complex solutions, connecting AI, cyber, and software strategies for maximum impact. Since 1984, the SEI has been one of only 10 Federally ...
5 Essential Questions for Implementing the Software Acquisition Pathway and the Tools to Tackle Them
In this webcast, Eileen Wrubel and Brigid O’Hearn discuss the launch of the Software Acquisition Go Bag. Our SEI team has helped hundreds of DoD programs deliver software-enabled capability through ...
Software bills of materials or SBOMs are critical to software security and supply chain risk management. Regardless of the SBOM tool, the output should be consistent for a given piece of software. But ...
This three (3) hour online course provides a thorough understanding of insider threat terminology, identifies different types of insider threats, teaches how to recognize both technical and behavioral ...
This contact form is for general questions and requests for contact. Do not use this contact form to send sensitive information. Please review the guidelines for sending sensitive information. If you ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results