The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
3 API Security Risks (and How to Protect Against Them)
Aug. 22, 2024
19:28
Evaluating Large Language Models for Cybersecurity Tasks: Challenges and Best Practices
July 25, 2024
43:05
Capability-based Planning for Early-Stage Software Development
July 18, 2024
33:55
Safeguarding Against Recent Vulnerabilities Related to Rust
July 1, 2024
26:25
Developing a Global Network of Computer Security Incident Response Teams (CSIRTs)
June 21, 2024
30:51
Automated Repair of Static Analysis Alerts
May 31, 2024
27:05
Cyber Career Pathways and Opportunities
May 28, 2024
31:23
My Story in Computing with Sam Procter
April 24, 2024
37:15
Developing and Using a Software Bill of Materials Framework
April 4, 2024
37:37
The Importance of Diversity in Cybersecurity: Carol Ware
March 21, 2024
26:37
The Importance of Diversity in Software Engineering: Suzanne Miller
29:02
The Importance of Diversity in Artificial Intelligence: Violet Turri
March 15, 2024
16:57
Using Large Language Models in the National Security Realm
Feb. 16, 2024
34:45
Atypical Applications of Agile and DevSecOps Principles
Feb. 9, 2024
33:41
When Agile and Earned Value Management Collide: 7 Considerations for Successful Interaction
Jan. 31, 2024
35:21
The Impact of Architecture on Cyber-Physical Systems Safety
Jan. 24, 2024
34:05
ChatGPT and the Evolution of Large Language Models: A Deep Dive into 4 Transformative Case Studies
Dec. 14, 2023
46:22
The Cybersecurity of Quantum Computing: 6 Areas of Research
Nov. 28, 2023
23:01
User-Centric Metrics for Agile
Nov. 16, 2023
31:41
The Product Manager’s Evolving Role in Software and Systems Development
Nov. 10, 2023
24:19
Measuring the Trustworthiness of AI Systems
Oct. 12, 2023
19:27
Actionable Data in the DevSecOps Pipeline
Sept. 13, 2023
31:58
Insider Risk Management in the Post-Pandemic Workplace
Sept. 8, 2023
47:34
An Agile Approach to Independent Verification and Validation
Aug. 9, 2023
31:57
Zero Trust Architecture: Best Practices Observed in Industry
July 26, 2023
27:53
Automating Infrastructure as Code with Ansible and Molecule
July 10, 2023
39:38
Identifying and Preventing the Next SolarWinds
June 20, 2023
46:04
A Penetration Testing Findings Repository
June 13, 2023
25:47
Understanding Vulnerabilities in the Rust Programming Language
June 8, 2023
36:45
We Live in Software: Engineering Societal-Scale Systems
May 18, 2023
39:31
Secure by Design, Secure by Default
May 10, 2023
54:05
Key Steps to Integrate Secure by Design into Acquisition and Development
May 2, 2023
48:50
An Exploration of Enterprise Technical Debt
April 18, 2023
25:56
The Messy Middle of Large Language Models
March 29, 2023
33:46
An Infrastructure-Focused Framework for Adopting DevSecOps
March 21, 2023
43:35
Software Security in Rust
March 15, 2023
18:09
Improving Interoperability in Coordinated Vulnerability Disclosure with Vultron
Feb. 24, 2023
51:16
Asking the Right Questions to Coordinate Security in the Supply Chain
Feb. 7, 2023
31:11
Securing Open Source Software in the DoD
Jan. 26, 2023
35:33
A Model-Based Tool for Designing Safety-Critical Systems
Dec. 13, 2022
48:43
Managing Developer Velocity and System Security with DevSecOps
Dec. 7, 2022
32:55
A Method for Assessing Cloud Adoption Risks
Nov. 17, 2022
21:47
Software Architecture Patterns for Deployability
Nov. 15, 2022
29:09
ML-Driven Decision Making in Realistic Cyber Exercises
Oct. 13, 2022
48:58
A Roadmap for Creating and Using Virtual Prototyping Software
Oct. 6, 2022
56:30
Software Architecture Patterns for Robustness
Sept. 15, 2022
31:13
A Platform-Independent Model for DevSecOps
Sept. 8, 2022
23:41
Using the Quantum Approximate Optimization Algorithm (QAOA) to Solve Binary-Variable Optimization Problems
Aug. 18, 2022
27:36
Trust and AI Systems
Aug. 5, 2022
35:24
A Dive into Deepfakes
July 28, 2022
You must Log In or Sign Up in order to subscribe.