
Goal-Line Defense: A Tool to Discover and Mitigate UEFI Vulnerabilities
As recently as December 2025, the Carnegie Mellon University Software Engineering Institute (SEI's) CERT Coordination Center (CERT/CC) docum...
Radio and PodcastLive Radio & PodcastsOpening Radio and Podcast...

Radio and PodcastLive Radio & PodcastsFetching podcast shows and categories...
Radio and PodcastLive Radio & PodcastsFetching podcast episodes...

Conversations in software engineering

As recently as December 2025, the Carnegie Mellon University Software Engineering Institute (SEI's) CERT Coordination Center (CERT/CC) docum...

In February 2026, Paul Nielsen announced that he will transition out of his role as director and chief executive officer of the Software Eng...

Cybersecurity staffing shortages are a major concern in the government given the increasingly sophisticated cyber attacks on the nation's cr...

While Stanford University found that AI investments, optimism, and accessibility are rising, a recent MIT report suggests that 95 percent of...

In October 2025, CyberPress reported a critical security vulnerability in the Redis Server, an open-source in-memory database that allowed a...

On November 7, the Department of War released an acquisition transformation strategy that seeks to remove bureaucratic hurdles and streamlin...

Organizations, including the U.S. military, are increasingly adopting cloud deployments for their flexibility and cost savings. The shared s...

From early 2022 through late 2024, a group of threat actors publicly known as APT28 exploited known vulnerabilities, such as CVE-2022-38028,...

Modern data analytic methods and tools—including artificial intelligence (AI) and machine learning (ML) classifiers—are revolutionizing pred...

How can you ever know whether an LLM is safe to use? Even self-host ed LLM system s are vulnerable to adversarial prompt s left on the inter...

Software bills of materials or SBOMs are critical to software security and supply chain risk management. Ideally, regardless of the SBOM too...

Application programing interfaces, more commonly known as APIs, are the engines behind the majority of internet traffic . The pervasive and...

Artificial intelligence (AI) is a transformational technology, but it has limitations in challenging operational settings. R esearchers in t...

A recent Google survey found that many developers felt comfortable using the Rust programming language in two months or less. Yet barriers t...

In response to Executive Order (EO) 14028, Improving the Nation's Cybersecurity , the National Institute of Standards and Technology (NIST)...

Container images are increasingly being used as the main method for software deployment, so ensuring the reproducibility of container images...

Software enables our way of life, but market forces have sidelined security concerns leaving systems vulnerable to attack. Fixing this probl...

A January 2025 Defense Innovation Board study on scaling nontraditional defense innovation stated, "We must act swiftly to ensure the DoD le...

Warfighters in the Department of Defense (DoD) operate in high-stakes environments where security, efficiency, and speed are critical. In su...

Deploying cloud-centric technologies such as Kubernetes in edge environments poses challenges, especially for mission-critical defense syste...

A strong cyber defense is vital to public - and private-sector activities in the United States. In 2019, in response to an executive order t...

Evaluating source code to ensure secure coding qualities costs time and effort and often involves static analysis. But those who are familia...

In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Gregory Touhill, director of the SEI CERT Division...

Insider incidents cause around 35 percent of data breaches, creating financial and security risks for organizations. In this podcast from th...

Grace Lewis , a principal researcher at the Carnegie Mellon University Software Engineering Institute (SEI) and lead of the SEI's Tactical a...

Machine learning (ML) models commonly experience issues when integrated into production systems. In this podcast, researchers from the Carne...

As software size, complexity, and interconnectedness has grown, software modernization within the Department of Defense (DoD) has become mor...

Containerization allows developers to run individual software applications in an isolated, controlled, repeatable way. With the increasing p...

Software cost estimation is an important first step when beginning a project. It addresses important questions regarding budget, staffing, s...

One of the biggest challenges in collecting cybersecurity metrics is scoping down objectives and determining what kinds of data to gather. I...

To make secure software by design a reality, engineers must intentionally build security throughout the software development lifecycle. In t...

Harmful biases in large language models (LLMs) make AI less trustworthy and secure. Auditing for biases can help identify potential solution...

In the wake of widespread adoption of artificial intelligence ( AI ) in critical infrastructure, education, government, and national securit...

The exposed and public nature of application programming interfaces (APIs) come with risks including the increased network attack surface. Z...

How can we effectively use large language models (LLMs) for cybersecurity tasks? In this Carnegie Mellon University Software Engineering Ins...

Capability-Based Planning (CBP) defines a framework that has an all-encompassing view of existing abilities and future needs for strategical...

What can the recently discovered vulnerabilities related to Rust tell us about the security of the language? In this podcast from the Carneg...

Cybersecurity risks aren't just a national concern. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI)...

Developers know that static analysis helps make code more secure. However, static analysis tools often produce a large number of false posit...

With the increasing complexity of software systems, the use of third-party components has become a widespread practice. Cyber disruptions, s...

At the request of the White House, the Office of the Director of National Intelligence (ODNI) began exploring use cases for large language m...

Modern software engineering practices of Agile and DevSecOps have provided a foundation for producing working software products faster and m...

Increasingly in government acquisition of software-intensive systems, we are seeing programs using Agile development methodology and earned...

As developers continue to build greater autonomy into cyber-physical systems (CPSs), such as unmanned aerial vehicles (UAVs) and automobiles...

To better understand the potential uses of large language models (LLMs) and their impact, a team of researchers at the Carnegie Mellon Unive...

Research and development of quantum computers continues to grow at a rapid pace. The U.S. government alone spent more than $800 million on q...

Far too often software programs continue to collect metrics for no other reason than that is how it has always been done. This leads to situ...

In working with software and systems teams developing technical products, Judy Hwang, a senior software engineer in the SEI CERT Division, o...

The ability of artificial intelligence (AI) to partner with the software engineer, doctor, or warfighter depends on whether these end users...

In this podcast from the Carnegie Mellon University Software Engineering Institute, Bill Nichols and Julie Cohen talk with Suzanne Miller ab...