Podcast Episodes

Back to Search
An Open Source Tool for Fault Tree Analysis

Safety-critical software must be analyzed and checked carefully. Each potential error, failure, or defect must be considered and evaluated before you…

9 years, 8 months ago

Short Long
View Episode
Global Value Chain – An Expanded View of the ICT Supply Chain

Organizations "are concerned about the risks associated with information and communications technology (ICT) products and services that may contain p…

9 years, 8 months ago

Short Long
View Episode
Intelligence Preparation for Operational Resilience

Intelligence preparation for Operational Resilience (IPOR) is a structured framework that decision makers can use to: •identify intelligence needs •…

9 years, 9 months ago

Short Long
View Episode
Evolving Air Force Intelligence with Agile Techniques

In the past decade, the U.S. Air Force has built up great capability with the Distributed Common Ground System (AF DCGS), the Air Force's primary wea…

9 years, 10 months ago

Short Long
View Episode
Threat Modeling and the Internet of Things

Threat modeling, which has been popularized by Microsoft in the last decade, provides vulnerability analysts a means to analyze a system and identify…

9 years, 11 months ago

Short Long
View Episode
Open Systems Architectures: When & Where to Be Closed

Due to advances in hardware and software technologies, Department of Defense (DoD) systems today are highly capable and complex. However, they also f…

10 years ago

Short Long
View Episode
Toward Efficient and Effective Software Sustainment

The Department of Defense (DoD) must focus on sustaining legacy weapons systems that are no longer in production, but are expected to remain a key co…

10 years ago

Short Long
View Episode
Effective Reduction of Avoidable Complexity in Embedded Systems

Safety-critical systems are becoming extremely software-reliant. Software complexity can increase total acquisition costs as much as 16 percent. The …

10 years ago

Short Long
View Episode
Quality Attribute Refinement and Allocation

We know from existing SEI work on attribute-driven design, Quality Attribute Workshops, and the Architecture Tradeoff Analysis Method that a focus on…

10 years, 1 month ago

Short Long
View Episode
Is Java More Secure Than C?

Whether Java is more secure than C is a simple question to ask, but a hard question to answer well. When researchers on the CERT Secure Coding Team b…

10 years, 1 month ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us