SEI Digital Library
Latest Publications
Bridging Research and Practice in LLM Agent Security
• White Paper
This systematic review discusses academic surveys, grey literature sources, and real-world case studies on securing LLM agents.
ReadFrom Data to Performance: Understanding and Improving Your AI Model
• Podcast
Drift in data and concept, evolving edge cases, and emerging phenomena can undermine the correlations that AI classifiers rely on. In this podcast, SEI researchers discuss a new tool to …
ListenWhat Could Possibly Go Wrong? Safety Analysis for AI Systems
• Podcast
SEI researchers discuss their work on System Theoretic Process Analysis, or STPA, a hazard-analysis technique uniquely suitable for dealing with AI complexity when assuring AI systems.
ListenHow to Address the Problem of Poorly-Defined Requirements in Software System Design
• Webcast
In this webcast, Lori Flynn and Lyndsi Hughes offer a solution to the problem of poorly defined requirements in system design that can lead to software flaws, cost and time …
WatchGetting Your Software Supply Chain In Tune with SBOM Harmonization
• Podcast
Software bills of materials or SBOMs are critical to software security and supply chain risk management. Regardless of the SBOM tool, the output should be consistent for a given piece …
Listen5 Essential Questions for Implementing the Software Acquisition Pathway and the Tools to Tackle Them
• Webcast
In this webcast, Eileen Wrubel and Brigid O’Hearn discuss the launch of the Software Acquisition Go Bag. Our SEI team has helped hundreds of DoD programs deliver software-enabled capability through …
WatchMinimally Viable Architecture: Architecture Early in Development
• Technical Note
This technical note explores MVAs and offers guidance on what teams should do with an MVA to get their certificate to field and authorization to operate.
ReadQ-Day Countdown: Are You Prepared?
• Webcast
In this webcast, Brett Tucker, Dan Justice, and Matthew Butkovic discuss the challenges to be expected with the realization of quantum computing capabilities.
WatchAPI Security: An Emerging Concern in Zero Trust Implementations
• Podcast
Application programming interfaces (APIs) are the engine behind most internet traffic. Recent vulnerabilities due to design flaws and incorrect deployments have made APIs a target for attacks.
ListenStandardization of Return on Risk Investment Computation
• White Paper
In this paper, Brett Tucker proposes standardizing how ROI is calculated and applied to quantitative risk-based decision making to enhance security resilience.
Read