Defensive Cyber Operations: Cyberwarfare Explained

With the average ransom payment almost doubling from $812,380 in 2022 to $1,542,333 in 2023, and with DDoS attacks and malicious bot traffic rising, it’s even more alarming that, in 2022, 20% of companies didn’t have an incident response plan in place. At SealingTech, we understand the technical mechanisms behind a cyberwarfare attack as well…

Read More

Implementing Security Controls: An Intro to JSIG

By Walker Haddock and Spencer Shimko Occasions often arise requiring information system owners to be diligent when it comes to protecting their data and projects. Researchers feel burdened by having to develop an information security plan to assure the Institutional Review Board (IRB) that their collected data and its study will be protected. In this…

Read More

Cross Domain Solutions and Weapons Systems

The next security domain in human protection Often, the sharing of potentially sensitive information between two security domains with varying classifications or security levels needs to happen. A high-speed system known as a Cross Domain Solution (CDS), a highly secure integrated software-hardware system, provides a controlled and protected interface for controlling the sharing of information…

Read More