Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type


Publication Date

Showing 1 - 10 of 176 results for the Threat

Technical Report | October 2017 - Technical Report 2017 Emerging Technology Domains Risk Survey By Dan J. Klinedinst, Joel Land, Kyle O'Meara

This report summarizes our understanding of future technologies. It helps US-CERT identify vulnerabilities, promote good security practices, and understand vulnerability risk.

Video | April 2017 - Video SEI Cyber Minute: Insider Threats By Randall F. Trzeciak

Watch Randy Trzeciak in this SEI Cyber Minute as he discusses

Technical Report | December 2016 - Technical Report Common Sense Guide to Mitigating Insider Threats, Fifth ... By Matthew L. Collins, Michael C. Theis, Randall F. Trzeciak, Jeremy R. Strozer, Jason W. Clark, Daniel L. Costa, Tracy Cassidy, Michael J. Albrethsen, Andrew P. Moore

Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.

Technical Report | December 2016 - Technical Report The Critical Role of Positive Incentives for Reducing Insider ... By Andrew P. Moore, Jeff Savinda, Elizabeth A. Monaco, Jamie L. Moyes, Denise M. Rousseau (Carnegie Mellon University), Samuel J. Perl, Jennifer Cowley, Matthew L. Collins, Tracy Cassidy, Nathan VanHoudnos, Palma Buttles-Valdez, Daniel Bauer, Allison Parshall

This report describes how positive incentives complement traditional practices to provide a better balance for organizations’ insider threat programs.

Technical Note | December 2016 - Technical Note Low Cost Technical Solutions to Jump Start an Insider Threat ... By George Silowash, Derrick Spooner, Daniel L. Costa, Michael J. Albrethsen

This technical note explores free and low cost technical solutions to help organizations prevent, detect, and respond to malicious insiders.

Brochure | December 2016 - Brochure SEI Education and Training Catalog

This catalog describes SEI training and certificates that help you tackle today's software, systems, and cybersecurity challenges.

Webinar | July 2016 - Webinar How to Build an Effective Insider Threat Program to Comply ... By Randall F. Trzeciak

In this webinar, Randy Trzeciak, Technical Manager of the CERT Insider Threat Center, described the summary of new requirements mandated by NISPOM Change 2 and the impact it will have on DoD contracting organizations.

Technical Report | May 2016 - Technical Report An Insider Threat Indicator Ontology By Daniel L. Costa, Michael J. Albrethsen, Matthew L. Collins, Samuel J. Perl, George Silowash, Derrick Spooner

This report presents an ontology for insider threat indicators, describes how the ontology was developed, and outlines the process by which it was validated.

White Paper | May 2016 - White Paper 2016 State of Cybercrime Survey

This paper examines the current state of cybercrime and explores how organizations and individuals respond to cybercrime threats.

Technical Report | April 2016 - Technical Report A Unique Approach to Threat Analysis Mapping: A Malware ... By Deana Shick, Kyle O'Meara

As they constantly change network infrastructure, adversaries consistently use and update their tools. This report presents a way for researchers to begin threat analysis with those tools rather than with network or incident data alone.