Software Developers

Dealing with Noisy Behavioral Analytics in Detection Engineering Dealing with Noisy Behavioral Analytics in Detection Engineering

This post discusses a process for tuning and related work you can do to make behavioral analytics..
The OSATE Slicer: Fast Reachability Query Support for Architectural Models The OSATE Slicer: Fast Reachability Query Support for Architectural Models

Our post introduces the OSATE Slicer, a new extension to the Open Source AADL Tool Environment that ..
File Uploads for the Web (3): File Uploads in Node and Nuxt File Uploads for the Web (3): File Uploads in Node and Nuxt

Welcome back to this series on uploading files to the web:Upload files with HTMLUpload files with..
Creating a Large Language Model Application Using Gradio Creating a Large Language Model Application Using Gradio

This post explains how to build a large language model across three primary use cases: basic..
Install and Setup MongoDB on Windows or Mac Install and Setup MongoDB on Windows or Mac

WindowsLet's look at the steps to download and install MongoDB on Windows.To install MongoDB in..
The Top 10 Blog Posts of 2023 The Top 10 Blog Posts of 2023

Every January on the SEI Blog, we present the 10 most-visited posts of the previous year. This..
OpenAI Collaboration Yields 14 Recommendations for Evaluating LLMs for Cybersecurity OpenAI Collaboration Yields 14 Recommendations for Evaluating LLMs for Cybersecurity

This SEI Blog post summarizes 14 recommendations to help assessors accurately evaluate LLM..
Designing and Conducting Digital Testing for Mobile Applications Designing and Conducting Digital Testing for Mobile Applications

As the digital landscape becomes more intricate, brands must cater to their customers’ needs..
Develop XR With Oracle, Ep. 5: Healthcare, Vision AI, Training/Collaboration, and Messaging Develop XR With Oracle, Ep. 5: Healthcare, Vision AI, Training/Collaboration, and Messaging

This is the fifth piece in a series on developing XR applications and experiences using Oracle and..
How To Automate an API Gateway Migration How To Automate an API Gateway Migration

Application Programming Interfaces (APIs) and API management are critical business assets. Today’s..
Maven Troubleshooting, Unstable Builds, and Open-Source Infrastructure Maven Troubleshooting, Unstable Builds, and Open-Source Infrastructure

Donald Knuth famously wrote that Premature Optimization is the root of all evil. I, for one,..
10 Tips To Optimize PostgreSQL Queries in Your Django Project 10 Tips To Optimize PostgreSQL Queries in Your Django Project

This article showcases optimization techniques that had great results at GitGuardian. You’ll find..
JSON in Kotlin JSON in Kotlin

In any web service that receives and transmits data to and from a server, the first and last events ..
3 Activities for Making Software Secure by Design 3 Activities for Making Software Secure by Design

Understanding key principles, roadblocks, and accelerators can shift the secure software..
Synergy Among Engineering Disciplines: Software, Cybersecurity, and AI Synergy Among Engineering Disciplines: Software, Cybersecurity, and AI

This post reviews the origins and interactions of the software, cybersecurity, and AI engineering..
Unlocking the Power of ChatGPT Unlocking the Power of ChatGPT

ChatGPT is an advanced language model created by OpenAI that uses deep learning algorithms to..
Using Game Theory to Advance the Quest for Autonomous Cyber Threat Hunting Using Game Theory to Advance the Quest for Autonomous Cyber Threat Hunting

This SEI Blog post describes an effort to apply game theory to the development of algorithms..
How to Prioritize Integrations for Your B2B SaaS Product How to Prioritize Integrations for Your B2B SaaS Product

One of the most frequent integration questions we hear from SaaS teams is, Which integrations..
Process and Technical Vulnerabilities: 6 Key Takeaways from a Chemical Plant Disaster Process and Technical Vulnerabilities: 6 Key Takeaways from a Chemical Plant Disaster

Weak processes can be as risky as technical vulnerabilities. This post describes how both of them..
How SecDevOps Adoption Can Help Save Costs in Software Development How SecDevOps Adoption Can Help Save Costs in Software Development

Security in software development is a critical issue that is often addressed late in the software..
How Can Causal Learning Help to Control Costs? How Can Causal Learning Help to Control Costs?

This post describes how to apply causal-modeling algorithms and tools to project data to identify,..
React, Angular, and Vue.js: What’s the Technical Difference? React, Angular, and Vue.js: What’s the Technical Difference?

React, Angular, and Vue.js are three popular JavaScript frameworks used for building complex,..
UEFI: 5 Recommendations for Securing and Restoring Trust UEFI: 5 Recommendations for Securing and Restoring Trust

This blog post expands on concerns brought to light from recent UEFI attacks, such as BlackLotus,..
There’s a Better Way To Deploy Code: Let’s Share It There’s a Better Way To Deploy Code: Let’s Share It

Gatekeeping best practices within the developer community benefits no one. If there's a better way..
Why You Should Automate Code Reviews Why You Should Automate Code Reviews

Code ReviewsCode review is a crucial part of software development. Code review, also called peer..
The Importance of Delegation in Management Teams The Importance of Delegation in Management Teams

Delegating power is a crucial aspect of managing teams effectively. It enables managers to assign..
Microsoft Access Supports Large Number Data Type Microsoft Access Supports Large Number Data Type

GitHub Copilot for CLI for PowerShell GitHub Copilot for CLI for PowerShell

GitHub Next has this cool project that is basically Copilot for the CLI (command line interface)...
Building a Scalable Search Architecture Building a Scalable Search Architecture

Creating a scalable search architecture is a popular and important task for many systems. There are ..
Bounce Houses For Sale Bounce Houses For Sale

Bounce Houses For Sale Get Multiple Free Quotes Trusted Bounce House Manufacturers If you are..
Bounce House Rental Software Bounce House Rental Software

Discover the #1 bounce house rental software by Event Rental Systems, offering online booking,..
The Benefits of Cyber Assessment Training The Benefits of Cyber Assessment Training

This post discusses how cybersecurity assessments can help critical infrastructure organizations..
Top Authentication Trends to Watch Out for in 2023 Top Authentication Trends to Watch Out for in 2023

The internet has become one of the most critical sectors for business communications, and..
A Cloud-Native SCADA System for Industrial IoT Built With Apache Kafka A Cloud-Native SCADA System for Industrial IoT Built With Apache Kafka

Industrial IoT and Industry 4.0 enable digitalization and innovation. SCADA control systems are a..
Streaming Data From MySQL to Postgres Streaming Data From MySQL to Postgres

Streaming data from a MySQL database to a PostgreSQL database can be a useful way to move data..
Required Skills/Knowledge To Pass AWS Machine Learning Specialty Certification Required Skills/Knowledge To Pass AWS Machine Learning Specialty Certification

Disclaimer: All the views and opinions expressed in the blog belong solely to the author and not..
How to Grow an AI-Ready DoD Workforce How to Grow an AI-Ready DoD Workforce

This SEI Blog post discusses the unique challenges of AI engineering for defense and national..
Using Alternate Data Streams in the Collection and Exfiltration of Data Using Alternate Data Streams in the Collection and Exfiltration of Data

In this blog post, we describe how attackers obscure their activity via alternate data streams..
Different Ways to Search Database Objects Different Ways to Search Database Objects

This article explains different methods to find the database objects in a SQL Database. We can use..
An Acquisition Security Framework for Supply Chain Risk Management An Acquisition Security Framework for Supply Chain Risk Management

This post introduces the Acquisition Security Framework (ASF), which helps organizations identify..