This podcast explores radio frequency attacks, such as those conducted by APT28, and how software and cybersecurity play key roles in preventing and mitigating these exploitations.
Sible, J., and Svoboda, D., 2022: Rust Software Security: A Current State Assessment. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Wilson, S., Place, P., and Korzec, K., 2023: The Seven Virtues of Reconciling Agile and Earned Value Management (EVM). Carnegie Mellon University, Software ...
Snoke, T., 2017: Best Practices for NTP Services. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 3, 2025, https://www ...
Firesmith, D., 2012: The Need to Specify Requirements for Off-Nominal Behavior. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Giobbi, R., 2008: Ping Sweeping in IPv6. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 4, 2025, https://www.sei.cmu ...
Klinedinst, D., 2016: On Board Diagnostics: Risks and Vulnerabilities of the Connected Vehicle. Carnegie Mellon University, Software Engineering Institute's Insights ...
Dormann, W., 2018: Life Beyond Microsoft EMET. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 2, 2025, https://www ...
This systematic review discusses academic surveys, grey literature sources, and real-world case studies on securing LLM agents.
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Brown, N., 2021: Taking DevSecOps to the Next Level with Value Stream Mapping. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Sherman, M., 2024: Using ChatGPT to Analyze Your Code? Not So Fast. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed December 3 ...