Deep Learning: Going Deeper toward Meaningful Patterns in Complex Data
Deep Learning, a quickly-growing subfield of machine learning, has realized great success in selecting and extracting features from a complex dataset.
Why You Should Apply Agile-DevOps Earlier in the Lifecycle
You're better off applying those lifecycle-end practices at the beginning of development.
Software & Cyber Solutions Symposium 2018 Agenda & Keynotes Announced
Registration is now open for the 2018 SCSS, a free one-day event sponsored by the SEI in Arlington, Virginia, on March 27.
Bitcoin, Blockchain, Machine Learning, and Ransomware: The Top 10 Posts of 2017
These were our most popular blog posts of 2017.
Obsidian: A Safer Blockchain Language
Eliezer Kanal introduces Obsidian, a Blockchain programming language designed to reduce vulnerabilities in Blockchain tools.
Technical Detection of Intended Violence: Workplace Violence as an Insider Threat
Research from the CERT National Insider Threat Center seeks to identify technical indicators of an insider’s intent to harm self and/or others.
CERT Division at a Glance
We were there for the first internet security incident and we’re still here more than 25 years later. Only now, we’ve expanded our expertise from incident response to a comprehensive, proactive approach to securing networked systems. The CERT Division is part of the Software Engineering Institute, which is based at Carnegie Mellon University. We are the world’s leading trusted authority dedicated to improving the security and resilience of computer systems and networks and are a national asset in the field of cybersecurity.
VU#940439: Quagga bgpd is affected by multiple vulnerabilities
Original Release date - 02/15/2018
VU#319904: Pulse Secure Linux client GUI fails to validate SSL certificates
Original Release date - 02/01/2018
VU#584653: CPU hardware vulnerable to side-channel attacks
Original Release date - 01/03/2018
- Report a Vulnerability
- Cyber Mutual Assistance Workshop Report The Army Cyber Institute hosted a Cyber Mutual Assistance Workshop to identify challenges in defining cyber requirements for Regional Mutual Assistance Groups. Special Report - 02/13/2018
- CyGraph: Big-Data Graph Analysis For Cybersecurity and Mission Resilience In this presentation, the author discusses CyGrap, a methodology and tool for improving network security posture, maintaining situational awareness in the face of cyberattacks, and focusing on protection of mission-critical assets. Presentation - 01/31/2018
- Automated Detection and Analysis of IoT Network Traffic Through Distributed Open Source Sensors and Citizen Scientists In this presentation, the author discusses securing the Internet of Things (IoT) through network based detection leveraging low cost distributed sensing, machine learning and citizen scientists. Presentation - 01/31/2018