Podcast Episodes
Back to SearchBest Practices in Cyber Intelligence
The SEI Emerging Technology Center is conducting a study sponsored by the U.S. Office of the Director of National Intelligence to understand cyber in…
7 years, 9 months ago
The Evolving Role of the Chief Risk Officer
In today's global business environment, risk management must be aligned to business strategy. As companies continue to shift their business models, s…
7 years, 10 months ago
Obsidian: A Safer Blockchain Programming Language
The Defense Advanced Research Projects Agency (DARPA) and other agencies are expressing significant interest in blockchain technology because it prom…
7 years, 11 months ago
Agile DevOps
DevOps breaks down software development silos to encourage free communication and constant collaboration. Agile, an iterative approach to development…
7 years, 11 months ago
Is Software Spoiling Us? Technical Innovations in the Department of Defense
This series of podcasts presents excerpts from a recent SEI virtual event, Is Software Spoiling Us? Jeff Boleng, acting chief technical officer, mode…
8 years, 1 month ago
Is Software Spoiling Us? Innovations in Daily Life from Software
This series of podcasts presents excerpts from a recent SEI virtual event, Is Software Spoiling Us. Jeff Boleng, acting chief technical officer, mode…
8 years, 2 months ago
How Risk Management Fits into Agile & DevOps in Government
DevOps, which breaks down software development silos to encourage free communication and constant collaboration, reinforces many Agile methodologies.…
8 years, 2 months ago
5 Best Practices for Preventing and Responding to Insider Threat
Insider threat continues to be a problem with approximately 50 percent of organizations experiencing at least one malicious insider incident per year…
8 years, 3 months ago
Pharos Binary Static Analysis: An Update
Pharos was created by the SEI CERT Division to automate the reverse engineering of binaries, with a focus on malicious code analysis. Pharos, which w…
8 years, 4 months ago
Positive Incentives for Reducing Insider Threat
In the 2016 Cyber Security Intelligence Index, IBM found that 60 percent of all cyber attacks were carried out by insiders. One reason that insider t…
8 years, 4 months ago