Experiences Using IBM Watson in Software Assurance
Can developers build an IBM Watson application to support an assurance review? CERT researchers detail their work in this blog post.
Powered by Mirai
The Mirai-powered botnet has been harnessed in recent DDoS attacks. This post explores the vulnerabilities exploited by Mirai and simple practices to mitigate the risk posed by botnets.
CERT Releases Updated Insider Threat Guidebook
The CERT Division SEI announced the release of the fifth edition of the Common Sense Guide to Mitigating Insider Threats, which is available for download on the SEI website.
Six Best Practices for Securing a Robust DNS Infrastructure
The Domain Name System is an essential component of the Internet, a virtual phone book of names and numbers, but we rarely think about it until something goes wrong.
Mapping the FFIEC Cybersecurity Assessment Tool (CAT) to the CRR
To help financial institutions assess their cyber resilience, we mapped FFIEC CAT statements to Cyber Resilience Review (CRR) questions.
Managing Third Party Risks to Financial Services Organizations
A resilience-based approach can help financial services organizations to manage cyber risks from outsourcing and comply with federal cybersecurity regulations.
NEWS
-
Trzeciak discusses new edition of Common Sense Guide to Mitigating Insider Threats
Media Coverage - 02/16/2017
CERT Division at a Glance
We were there for the first internet security incident and we’re still here more than 25 years later. Only now, we’ve expanded our expertise from incident response to a comprehensive, proactive approach to securing networked systems. The CERT Division is part of the Software Engineering Institute, which is based at Carnegie Mellon University. We are the world’s leading trusted authority dedicated to improving the security and resilience of computer systems and networks and are a national asset in the field of cybersecurity.
Learn More About the CERT Division:
RECENT VULNERABILITIES
-
VU#214283: Commvault Edge contains a buffer overflow vulnerability
Original Release date - 03/16/2017 -
VU#553503: D-Link DIR-130 and DIR-330 are vulnerable to authentication bypass and do not protect credentials
Original Release date - 03/15/2017 -
VU#834067: Apache Struts 2 is vulnerable to remote code execution
Original Release date - 03/14/2017 - Report a Vulnerability
PUBLICATIONS
- The CISO Academy In this paper, the authors describe the project that led to the creation of the U.S. Postal Service's CISO Academy. White Paper - 02/23/2017
- Supply Chain and Commercial-off-the-Shelf (COTS) Assurance The Software Engineering Institute can help your organization apply techniques to reduce software supply chain risk. White Paper - 01/24/2017
- SQUARE Frequently Asked Questions (FAQ) This paper contains information about SQUARE, a process that helps organizations build security into the early stages of the software production lifecycle. White Paper - 01/05/2017
EVENTS
Blogs
Podcasts
Becoming a CISO: Formal and Informal Requirements
In this podcast, Darrell Keeling, Vice President of Information Security and HIPAA Security Officer at Parkview Health, discusses the knowledge, skills, and abilities needed to become a CISO in today’s fast-paced cybersecurity field. Podcast - 10/19/2016
Global Value Chain – An Expanded View of the ICT Supply Chain
In this podcast, Edna Conway and John Haller discuss the global value chain for organizations and critical infrastructures and how this expanded view can be used to improve ICT supply chain management, including risks to the supply chain. Podcast - 07/18/2016

- Legal
- Terms of Use
- Privacy Statement
- Intellectual Property
Contact Us