This podcast explores radio frequency attacks, such as those conducted by APT28, and how software and cybersecurity play key roles in preventing and mitigating these exploitations.
Sible, J., and Svoboda, D., 2022: Rust Software Security: A Current State Assessment. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Firesmith, D., 2012: The Need to Specify Requirements for Off-Nominal Behavior. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Klinedinst, D., 2016: On Board Diagnostics: Risks and Vulnerabilities of the Connected Vehicle. Carnegie Mellon University, Software Engineering Institute's Insights ...
This systematic review discusses academic surveys, grey literature sources, and real-world case studies on securing LLM agents.
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Software is vital to our country’s global competitiveness, innovation, and national security. It also ensures our modern standard of living and enables continued advances in defense, infrastructure, ...
Sherman, M., 2024: Using ChatGPT to Analyze Your Code? Not So Fast. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 3 ...
Novak, W., 2023: Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Clinging to the Old Ways. Carnegie Mellon University, Software Engineering Institute's ...
Morrow, T., 2018: 12 Risks, Threats, & Vulnerabilities in Moving to the Cloud. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
CERT/CC advisories are now part of the US-CERT National Cyber Awareness System. We provide these advisories, published by year, for historical purposes.
Spring, J., 2022: Probably Don’t Rely on EPSS Yet. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed November 26, 2025, https ...