Podcast Episodes
Back to SearchCloud Computing for the Battlefield
Soldiers can use handheld mobile computing devices (aka smart-phones) to help with various tasks, such as speech and image recognition, natural langu…
13 years, 7 months ago
An Architecture-Focused Measurement Framework for Managing Technical Debt
Managing technical debt, which refers to the rework and degraded quality resulting from overly hasty delivery of software capabilities to users, is a…
13 years, 7 months ago
Agile Acquisition
The SEI is focused on reducing the DoD information technology (IT) development cycle currently as long as 81 months to short, incremental approaches …
13 years, 7 months ago
How a Disciplined Process Enhances & Enables Agility
Typically, people who believe themselves to be Agile, believe that developers realize the best results when they focus on empowered teams, collaborat…
13 years, 7 months ago
U.S. Postal Inspection Service Use of the CERT Resilience Management Model
CERT-RMM can be used to establish and meet resilience requirements for a wide range and diverse set of business objectives. Related Courses Introd…
13 years, 7 months ago
Insights from the First CERT Resilience Management Model Users Group
Implementing CERT-RMM requires well-defined improvement objectives, sponsorship, proper scoping and diagnosis, and defined processes and measures. …
13 years, 8 months ago
NIST Catalog of Security and Privacy Controls, Including Insider Threat
Security controls, including those for insider threat, are the safeguards necessary to protect information and information systems. Related Course I…
13 years, 11 months ago
Cisco's Adoption of CERT Secure Coding Standards
Implementing secure coding standards to reduce the number of vulnerabilities that can escape into operational systems is a sound business decision. …
14 years, 1 month ago
How to Become a Cyber Warrior
Protecting the internet and its users against cyber attacks requires a significant increase in the number of skilled cyber warriors. Related Courses…
14 years, 2 months ago
Considering Security and Privacy in the Move to Electronic Health Records
Electronic health records bring many benefits along with security and privacy challenges. Listen on Apple Podcasts.
14 years, 3 months ago