Blog
Learn about what makes our company culture unique and why SealingTech employees love working here.
Cloud Security (Part 1): Passive Security Monitoring in RackSpace
This is Part 1 of our “Cloud Security” series, with a goal of setting up a simple passive security monitoring capability in the cloud. Future posts will show how to…
SANS 2018 Holiday Hack Challenge
Here at SealingTech we are proud to have a team of engineers who are constantly challenging themselves and each other at work and in their free time! You may recall several other…
Trick or Treat: Halloween PCAP Challenge from Cloudshark
TL;DR During Halloween, a company called Cloudshark released a Packet Capture challenge that involved finding hidden “pumpkins” that were hidden in packets. Two SealingTech employees, Tony Efantis and Scott Lohin,…
How to Script Large Ixia Breaking Point Network Profiles
Background My team at SealingTech was tasked with testing the performance of a router that would be a tunnel endpoint for many different Site to Site VPN connections from various…
Cisco Live! 2018 – Orlando, FL
I am fortunate to work for a company that truly believes in continuing education for all it’s employees (one of the many perks of working at SealingTech). Each employee gets…
Host Based Risk Scoring (Part 2): Calculating the Vulnerability Level of a System
This is Part 2 of the Host Based Risk Scoring series. If you haven’t checked out Part 1, check out the post at Host Based Risk Scoring (Part 1). Please…
Adventures in Suricata (Part 1): Low Cost Intrusion Detection System
Welcome to the Adventures in Suricata series! Over the past couple months I have been exploring Suricata, an open source Intrusion Detection System (IDS), by standing it up in my…
BSidesCharm 2018
We had such a great time at BSidesCharm 2018 – so much so that I felt compelled to write about it. Over the past couple years I have attended this…
Could your news use a jolt?
Find out what’s happening across the cyber landscape every month with The Lightning Report.
Be privy to the latest trends and evolutions, along with strategies to safeguard your government agency or enterprise from cyber threats. Subscribe now.