CERT Guide to Insider Threats Named to Cybersecurity Canon
Coauthors Andrew Moore and Randall Trzeciak honored at Ignite 2016 Cybersecurity Conference.
Is Java More Secure Than C?
In this podcast, CERT researcher David Svoboda analyzes secure coding rules for both C and Java to determine if they indeed refute the conventional wisdom that Java is more secure than C.
Technical Meeting for CSIRTs with National Responsibility Set for Seoul
Registration is open for the 11th Annual Technical Meeting for CSIRTs with National Responsibility in Seoul, South Korea, June 17-18, 2016.
More Than 200 Thought Leaders Convene to Spur Pittsburgh’s Role as Center for Cybersecurity Innovation
Ridge and Hickton encourage Cyburgh, PA Initiative audience to build on Pittsburgh’s history and resources to help solve the nation’s cybersecurity challenges.
Follow Recent CERT Division Research
Our research focuses on cybersecurity challenges in national security, homeland security, and critical infrastructure protection and produces new ways to improve cybersecurity practice in private and public organizations.
CERT Tools Reflect Our Research
We offer a range of cybersecurity tools and methods, including tools to help you detect, eliminate, and avoid creating vulnerabilities in software.
NEWS
-
SEI Teams with (ISC)2 to Host High School Cybersecurity Competition
Article - 04/13/2016
CERT Division at a Glance
We were there for the first internet security incident and we’re still here 25 years later. Only now, we’ve expanded our expertise from incident response to a comprehensive, proactive approach to securing networked systems. The CERT Division is part of the Software Engineering Institute, which is based at Carnegie Mellon University. We are the world’s leading trusted authority dedicated to improving the security and resilience of computer systems and networks and are a national asset in the field of cybersecurity.
Learn More About the CERT Division:
RECENT VULNERABILITIES
-
VU#505560: Accellion File Transfer Appliance (FTA) contains multiple vulnerabilities
Original Release date - 04/29/2016 -
VU#718152: NTP.org ntpd contains multiple vulnerabilities
Original Release date - 04/27/2016 -
VU#229047: Allround Automations PL/SQL Developer v11 performs updates over HTTP
Original Release date - 04/25/2016 - Report a Vulnerability
PUBLICATIONS
- On Board Diagnostics: Risks and Vulnerabilities of the Connected Vehicle This report describes cybersecurity risks and vulnerabilities in modern connected vehicles. White Paper - 04/13/2016
- Measuring What Matters In this presentation, Lisa Young discusses how to measure the things that matter to your business. Presentation - 02/18/2016
- The Security Wolf of Wall Street: Fighting Crime with High-Frequency Classification and Natural Language Processing This presentation focuses on how to build a scalable machine learning infrastructure in real-time. Presentation - 01/14/2016
EVENTS
- NatCSIRT 2016 At this event, organizations responsible for protecting the security of nations, economies, and critical infrastructures meet to discuss current issues, tools, and methods that are relevant to the National CSIRT community. Conferences - 06/17/2016
Blogs
On Board Diagnostics: Risks and Vulnerabilities of the Connected Vehicle
04/20/2016 - Dan J. KlinedinstPodcasts
Build Security In Maturity Model (BSIMM) – Practices from Seventy Eight Organizations
In this podcast, Gary McGraw, the Chief Technology Officer for Cigital, discusses the latest version of BSIMM and how to take advantage of observed practices from high-performing organizations. Podcast - 02/03/2016
Structuring the Chief Information Security Officer Organization
In this podcast, Nader Mehravari and Julia Allen, members of the CERT Cyber Risk Management team, discuss an effective approach for defining a CISO team structure and functions for large, diverse organizations. Podcast - 12/23/2015

- Legal
- Terms of Use
- Privacy Statement
- Intellectual Property
Contact Us