The guide is the first release in the Software Acquisition Go Bag series of resources for defense software programs seeking to advance acquisition practices.
CERT Insider Threat Center, T., 2015: Handling Threats from Disgruntled Employees. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Kicking off the Software Acquisition Go Bag series, Brigid O'Hearn (Software Modernization Policy Lead) of the Software Solutions Division at the SEI walks through the definitions and process of a ...
Cois, C., 2015: DevOps Case Study: Netflix and the Chaos Monkey. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 12 ...
Organizations can use the maturity model to establish a baseline for adopting artificial intelligence and roadmap future investments, according to a new SEI paper.
Spring, J., 2022: Probably Don’t Rely on EPSS Yet. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 18, 2025, https ...
Software is vital to our country’s global competitiveness, innovation, and national security. It also ensures our modern standard of living and enables continued advances in defense, infrastructure, ...
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Brown, N., 2021: Taking DevSecOps to the Next Level with Value Stream Mapping. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Groce, P., 2023: Using Game Theory to Advance the Quest for Autonomous Cyber Threat Hunting. Carnegie Mellon University, Software Engineering Institute's Insights ...
Hughes, L., and Jackson, V., 2021: A Framework for DevSecOps Evolution and Achieving Continuous-Integration/Continuous-Delivery (CI/CD) Capabilities. Carnegie Mellon ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results