Archive for April 2024
How to Set Up a Rootless GitHub Container Building Pipeline
When developing containerized applications for government customers, certain security and software requirements must be taken into consideration. The government tries to move toward Red Hat’s Universal Base Images (UBIs) to ensure the security of containers. While UBIs can be built on non-Red Hat operating systems, doing so limits your choice of packages. At SealingTech, we…
Read MoreDefensive Cyber Operations: Cyberwarfare Explained
With the average ransom payment almost doubling from $812,380 in 2022 to $1,542,333 in 2023, and with DDoS attacks and malicious bot traffic rising, it’s even more alarming that, in 2022, 20% of companies didn’t have an incident response plan in place. At SealingTech, we understand the technical mechanisms behind a cyberwarfare attack as well…
Read MoreImplementing Security Controls: An Intro to JSIG
Occasions often arise requiring information system owners to be diligent when it comes to protecting their data and projects. Researchers feel burdened by having to develop an information security plan to assure the Institutional Review Board (IRB) that their collected data and its study will be protected. In this blog, the first in a series,…
Read MoreCross Domain Solutions and Weapons Systems
The next security domain in human protection Often, the sharing of potentially sensitive information between two security domains with varying classifications or security levels needs to happen. A high-speed system known as a Cross Domain Solution (CDS), a highly secure integrated software-hardware system, provides a controlled and protected interface for controlling the sharing of information…
Read More