61 minutes |
18 days ago
SolarWinds Hack: Fallout, Recovery, and Prevention
63 minutes |
a month ago
Software Engineering for Machine Learning
54 minutes |
3 months ago
Busting the Myths of Programmer Productivity
62 minutes |
3 months ago
What Is Cybersecurity Engineering and Why Do I Need It?
61 minutes |
5 months ago
Threats for Machine Learning
46 minutes |
5 months ago
Follow the CUI: Setting the Boundaries for Your CMMC Assessment
62 minutes |
6 months ago
Risk Management for the Enterprise–How Do You Get Executives to Care About Your Risks?
62 minutes |
7 months ago
Quality Attribute Concerns for Microservices at the Edge
55 minutes |
7 months ago
Agile in Government: Go for Insight, Not Just Oversight
60 minutes |
8 months ago
Organizational Resilience in a Time of Crisis
63 minutes |
8 months ago
Solving Current Cyber Challenges: Academic and Industry Collaboration
44 minutes |
9 months ago
Software Architecture: A Mature Discipline?
61 minutes |
9 months ago
A Discussion on DoD Software Advances and What’s Next from SEI
65 minutes |
10 months ago
Top 5 Considerations Before Boarding the Container Ship
62 minutes |
10 months ago
Trust, Verify & Authorize with DevSecOps
54 minutes |
10 months ago
Hitting the Ground Running: Reviewing the 17 CMMC Level 1 Practices
21 minutes |
a year ago
The DoD’s Cybersecurity Maturity Model Certification and Process Maturity
29 minutes |
a year ago
Connecting Cyber Risk Managers to Executives: Understanding Risk Governance and Appetite
57 minutes |
a year ago
At What Point Does DevSecOps Become Too Risky for the Business?
62 minutes |
a year ago
Becoming a Better Software Architect