Showing 1 - 10 of 115 results for the Publish Year - 2017
Watch Ipek Ozkaya in this Cyber Minute, as she recommends developers adopt a simple practice of reporting technical debt, including its potential accumulating side effects, as they discover or accrue that debt.
The CERT Secure Coding Team announces several open positions on its team in secure coding and software assurance.
We live in a software defined world. More and more of the capability and value we derive from our connected devices is achieved by software.
This guide provides an introduction to the key concepts, principles, and roles necessary to establish a successful Coordinated Vulnerability Disclosure process. It also provides insights into how CVD can go awry and how to respond when it does so.
In this presentation, Eliezer Kanal discusses how machine learning speeds prediction and classification in cybersecurity.
This tutorial offers training on data science in cybersecurity principles and practices.
Watch Bob Schiela as he decribes how SEI Secure Coding Standards have codified best practices for properly using features of specific languages to avoid security flaws in your software, thus reducing vulnerabilities.
SCALe help analysts be more efficient and effective at auditing source code for security flaws.
Nearly 2 billion vulnerable components are downloaded annually, and the average application has more than 20 open source vulnerabilities. Mark Sherman recommends the SPDO approach to secure open source components to diminish the risk and the impact.
This technical sheet details our project to extract heart rate from commodity video in real time.