This systematic review discusses academic surveys, grey literature sources, and real-world case studies on securing LLM agents.
Morrow, T., and Nicolai, M., 2022: The Zero Trust Journey: 4 Phases of Implementation. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Scanlon, T., 2023: Cybersecurity of Quantum Computing: A New Frontier. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed November ...
Complete the form below to register and download a free online copy of SEI CERT C Coding Standard: Rules for Developing Safe, Reliable, and Secure Systems (2016 Edition). Writing secure C code helps ...
Costa, D., 2019: September Is National Insider Threat Awareness Month. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed November ...
Kartch, R., 2017: Best Practices for Network Border Protection. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed November 19 ...
Nord, R., 2016: The Future of Managing Technical Debt. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed November 26, 2025, https ...
This post outlines 5 essential questions to ask before implementing the Software Acquisition Pathway (SWP) and an SEI toolset to assist in the effort. It is essential that software and acquisition ...
SEI researchers discuss their work on System Theoretic Process Analysis, or STPA, a hazard-analysis technique uniquely suitable for dealing with AI complexity when assuring AI systems.
Bernaciak, C., and Ross, D., 2022: How Easy Is It to Make and Detect a Deepfake?. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Shevchenko, N., 2020: An Introduction to Model-Based Systems Engineering (MBSE). Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results