Podcast Episodes
Back to Search3 Key Elements for Designing Secure Systems
To make secure software by design a reality, engineers must intentionally build security throughout the software development lifecycle. In this podca…
1 year, 6 months ago
Using Role-Playing Scenarios to Identify Bias in LLMs
Harmful biases in large language models (LLMs) make AI less trustworthy and secure. Auditing for biases can help identify potential solutions and de…
1 year, 7 months ago
Best Practices and Lessons Learned in Standing Up an AISIRT
In the wake of widespread adoption of artificial intelligence (AI) in critical infrastructure, education, government, and national security enti…
1 year, 7 months ago
3 API Security Risks (and How to Protect Against Them)
The exposed and public nature of application programming interfaces (APIs) come with risks including the increased network attack surface. Zero trus…
1 year, 7 months ago
Evaluating Large Language Models for Cybersecurity Tasks: Challenges and Best Practices
How can we effectively use large language models (LLMs) for cybersecurity tasks? In this Carnegie Mellon University Software Engineering Institute p…
1 year, 8 months ago
Capability-based Planning for Early-Stage Software Development
Capability-Based Planning (CBP) defines a framework that has an all-encompassing view of existing abilities and future needs for strategically decid…
1 year, 9 months ago
Safeguarding Against Recent Vulnerabilities Related to Rust
What can the recently discovered vulnerabilities related to Rust tell us about the security of the language? In this podcast from the Carnegie Mellon…
1 year, 9 months ago
Developing a Global Network of Computer Security Incident Response Teams (CSIRTs)
Cybersecurity risks aren't just a national concern. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), the CER…
1 year, 9 months ago
Automated Repair of Static Analysis Alerts
Developers know that static analysis helps make code more secure. However, static analysis tools often produce a large number of false positives, hi…
1 year, 10 months ago
Developing and Using a Software Bill of Materials Framework
With the increasing complexity of software systems, the use of third-party components has become a widespread practice. Cyber disruptions, such as So…
2 years ago