The guide is the first release in the Software Acquisition Go Bag series of resources for defense software programs seeking to advance acquisition practices.
Organizations can use the maturity model to establish a baseline for adopting artificial intelligence and roadmap future investments, according to a new SEI paper.
This newsletter compiles the latest SEI releases and news about SWP: Ready, Set, Go!, the first release in the SEI's Software Acquisition Pathway Go Bag series of resources; analyzing partially ...
Cois, C., 2015: DevOps Case Study: Netflix and the Chaos Monkey. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 12 ...
This podcast explores radio frequency attacks, such as those conducted by APT28, and how software and cybersecurity play key roles in preventing and mitigating these exploitations.
Software is vital to our country’s global competitiveness, innovation, and national security. It also ensures our modern standard of living and enables continued advances in defense, infrastructure, ...
Novak, W., 2023: Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Clinging to the Old Ways. Carnegie Mellon University, Software Engineering Institute's ...
Groce, P., 2023: Using Game Theory to Advance the Quest for Autonomous Cyber Threat Hunting. Carnegie Mellon University, Software Engineering Institute's Insights ...
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Hughes, L., and Jackson, V., 2021: A Framework for DevSecOps Evolution and Achieving Continuous-Integration/Continuous-Delivery (CI/CD) Capabilities. Carnegie Mellon ...
In this paper, the authors outline challenges with the Common Vulnerability Scoring System (CVSS) published standard and propose changes to improve it. This paper focuses on common misconceptions and ...
Sherman, M., 2024: Using ChatGPT to Analyze Your Code? Not So Fast. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 19 ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results