Showing 1 - 10 of 267 results for Publish Year - 2017
Randy Trzeciak, technical manager of the CERT National Insider Threat Center, discusses five best practices for preventing and responding to insider threat.
The CERT Secure Coding team requests contributors for Ada guidelines it's developing, describes its collaborations with MITRE, and announces its open research positions.
In this paper, domain parking is the practice of assign- ing a nonsense location to an unused fully-qualified domain name (FQDN) to keep it ready for “live” use.
By creating a secure-by-design language that renders certain types of bugs impossible to create, we aim to significantly reduce the risk inherent in the adoption of blockchain technology.
Jeff Gennari discusses updates to the Pharos framework, which automates reverse engineering of malware analysis, including new tools, improvements, and bug fixes.
Watch Will Klieber in this SEI Cyber Minute as he discusses Inference of Memory Bounds: Preventing the Next Heartbleed.
This presentation discusses how organizations can identify, prioritize, and select appropriate security controls.
This document provides security researchers with a repeatable methodology to produce more thorough and actionable results when analyzing embedded devices for vulnerabilities.
This webinar focused on the development and application of combined data analytics and offered several examples of analytics that combine domain resolution data, network device inventory and configuration data, and intrusion detection.
ADIA is a VMware-based appliance used for small-to-medium sized digital investigations.