Podcast Episodes
Back to SearchThe Best and Brightest: 6 Years of Supporting the President's Cup Cybersecurity Competition
A strong cyber defense is vital to public- and private-sector activities in the United States. In 2019, in response to an executive order to stre…
11 months ago
Updating Risk Assessment in the CERT Secure Coding StandardUpdating Risk Assessment in the CERT Secure Coding Standard
Evaluating source code to ensure secure coding qualities costs time and effort and often involves static analysis. But those who are familiar with s…
11 months, 4 weeks ago
Delivering Next Generation Cyber Capabilities to the DoD Warfighter
In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Gregory Touhill, director of the SEI CERT Division, sits do…
1 year ago
Getting the Most Out of Your Insider Risk Data with IIDES
Insider incidents cause around 35 percent of data breaches, creating financial and security risks for organizations. In this podcast from the Carneg…
1 year ago
Grace Lewis Outlines Vision for IEEE Computer Society Presidency
Grace Lewis, a principal researcher at the Carnegie Mellon University Software Engineering Institute (SEI) and lead of the SEI's Tactical and AI-Ena…
1 year, 1 month ago
Improving Machine Learning Test and Evaluation with MLTE
Machine learning (ML) models commonly experience issues when integrated into production systems. In this podcast, researchers from the Carnegie Mell…
1 year, 1 month ago
DOD Software Modernization: SEI Impact and Innovation
As software size, complexity, and interconnectedness has grown, software modernization within the Department of Defense (DoD) has become more impor…
1 year, 1 month ago
Securing Docker Containers: Techniques, Challenges, and Tools
Containerization allows developers to run individual software applications in an isolated, controlled, repeatable way. With the increasing prevalence…
1 year, 3 months ago
An Introduction to Software Cost Estimation
Software cost estimation is an important first step when beginning a project. It addresses important questions regarding budget, staffing, scheduling…
1 year, 4 months ago
Cybersecurity Metrics: Protecting Data and Understanding Threats
One of the biggest challenges in collecting cybersecurity metrics is scoping down objectives and determining what kinds of data to gather. In this po…
1 year, 6 months ago