Prioritizing Security Alerts: A DoD Case Study
The sheer effort required to triage the large number of potential code flaws identified by static analysis tools can hijack a software project’s budget and schedule.
Automated Code Repair in the C Programming Language
Finding violations of secure coding guidelines in source code is daunting, but fixing them is an even greater challenge. Automated code repair can eliminate security vulnerabilities much faster than the existing manual process and at a much lower cost.
Distributed Denial of Service Attacks: Four Best Practices for Prevention and Response
CERT researcher Rachel Kartch provides an overview of DDoS attacks and best practices for mitigating and responding to them.
An Evaluation of Three Cyber Threat Models
This blog post evaluates three popular methods of cyber threat modeling and a potential model that fuses the best qualities of each.
Mapping the FFIEC Cybersecurity Assessment Tool (CAT) to the CRR
To help financial institutions assess their cyber resilience, we mapped FFIEC CAT statements to Cyber Resilience Review (CRR) questions.
Managing Third Party Risks to Financial Services Organizations
A resilience-based approach can help financial services organizations to manage cyber risks from outsourcing and comply with federal cybersecurity regulations.
NEWS
-
FloCon 2017 Announces Conference Program and Keynote
Press Release - 11/29/2016
CERT Division at a Glance
We were there for the first internet security incident and we’re still here more than 25 years later. Only now, we’ve expanded our expertise from incident response to a comprehensive, proactive approach to securing networked systems. The CERT Division is part of the Software Engineering Institute, which is based at Carnegie Mellon University. We are the world’s leading trusted authority dedicated to improving the security and resilience of computer systems and networks and are a national asset in the field of cybersecurity.
Learn More About the CERT Division:
RECENT VULNERABILITIES
-
VU#909240: Cisco WebEx web browser extension allows arbitrary code execution
Original Release date - 01/27/2017 -
VU#865216: CodeLathe FileCloud is vulnerable to cross-site request forgery
Original Release date - 01/13/2017 -
VU#767208: ThreatMetrix SDK for iOS fails to validate SSL certificates
Original Release date - 01/10/2017 - Report a Vulnerability
PUBLICATIONS
- Supply Chain and Commercial-off-the-Shelf (COTS) Assurance The Software Engineering Institute can help your organization apply techniques to reduce software supply chain risk. White Paper - 01/24/2017
- SQUARE Frequently Asked Questions (FAQ) This paper contains information about SQUARE, a process that helps organizations build security into the early stages of the software production lifecycle. White Paper - 01/05/2017
- Using Malware Analysis to Identify Overlooked Security Requirements (MORE) In this presentation, Nancy Mead explains how malware analysis can be used effectively to identify otherwise overlooked security requirements. Presentation - 01/03/2017
EVENTS
Blogs
Preventing DDoS Attacks, Scaling Agile, Insider Threat, and Software Architecture: The Latest Work from the SEI
01/30/2017 - Douglas C. SchmidtPodcasts
Becoming a CISO: Formal and Informal Requirements
In this podcast, Darrell Keeling, Vice President of Information Security and HIPAA Security Officer at Parkview Health, discusses the knowledge, skills, and abilities needed to become a CISO in today’s fast-paced cybersecurity field. Podcast - 10/19/2016
Global Value Chain – An Expanded View of the ICT Supply Chain
In this podcast, Edna Conway and John Haller discuss the global value chain for organizations and critical infrastructures and how this expanded view can be used to improve ICT supply chain management, including risks to the supply chain. Podcast - 07/18/2016

- Legal
- Terms of Use
- Privacy Statement
- Intellectual Property
Contact Us