Showing 1 - 10 of 100 results for the Type - Video
Unfortunately, where there is software, there are risks from vulnerabilities. In response, the Department of Defense has recently expanded the key document governing acquisition, 5000.02.
At the SEI, we are developing tools, techniques, and tutorials to help developers make autonomous systems that are dependable and predictable while preserving core system features and functionality that extend and complement human operators.
Watch Will Hayes in this Cyber Minute as he discusses using practices like continuous integration and a common code base, which help teams focus on getting the work done.
With an ever increasing number of crimes with a cyber component, the need for investigators who have been trained the ways of the Internet, encryption, and social media, to name a few, is growing and will continue to grow.
So what is risk appetite? It is the amount and type of risk that an organization is willing to accept. In other words, risk appetite specifies value ranges for key performance indicators.
Watch Ipek Ozkaya in this Cyber Minute, as she recommends developers adopt a simple practice of reporting technical debt, including its potential accumulating side effects, as they discover or accrue that debt.
We live in a software defined world. More and more of the capability and value we derive from our connected devices is achieved by software.
Watch Bob Schiela as he decribes how SEI Secure Coding Standards have codified best practices for properly using features of specific languages to avoid security flaws in your software, thus reducing vulnerabilities.
Nearly 2 billion vulnerable components are downloaded annually, and the average application has more than 20 open source vulnerabilities. Mark Sherman recommends the SPDO approach to secure open source components to diminish the risk and the impact.
Watch Elli Kanal in this SEI Cyber Minute as he discusses