The guide is the first release in the Software Acquisition Go Bag series of resources for defense software programs seeking to advance acquisition practices.
This podcast explores radio frequency attacks, such as those conducted by APT28, and how software and cybersecurity play key roles in preventing and mitigating these exploitations.
Organizations can use the maturity model to establish a baseline for adopting artificial intelligence and roadmap future investments, according to a new SEI paper.
Kicking off the Software Acquisition Go Bag series, Brigid O'Hearn (Software Modernization Policy Lead) of the Software Solutions Division at the SEI walks through the definitions and process of a ...
Complete the form below to register and download a free online copy of SEI CERT C Coding Standard: Rules for Developing Safe, Reliable, and Secure Systems (2016 Edition). Writing secure C code helps ...