Blog
Learn about what makes our company culture unique and why SealingTech employees love working here.
Host Based Risk Scoring (Part 2): Calculating the Vulnerability Level of a System
This is Part 2 of the Host Based Risk Scoring series. If you haven’t checked out Part 1, check out the post at Host Based Risk Scoring (Part 1). Please…
Adventures in Suricata (Part 1): Low Cost Intrusion Detection System
Welcome to the Adventures in Suricata series! Over the past couple months I have been exploring Suricata, an open source Intrusion Detection System (IDS), by standing it up in my…
BSidesCharm 2018
We had such a great time at BSidesCharm 2018 – so much so that I felt compelled to write about it. Over the past couple years I have attended this…
Host Based Risk Scoring (Part 1): How do you calculate Risk?
Hey all! This is the first post in a series about the concepts of a Host Based Risk Scoring System. This is an idea I had a few years ago,…
Swipe right…into your next job
Maybe it’s my recent re-introduction into singledom, or maybe it’s because today is Valentine’s Day, but I can’t help but notice the similarities between dating and looking for a job. …
Interning at SealingTech: Two Insiders’ Tales
SealingTech’s Internship Program takes place over the course of 11 weeks from May to August. This past year, two talented computer engineers were selected to participate in the summer 2017…
Mapping Out the Risk Management Framework (RMF)
The days of DIACAP are phasing out. No more MAC and CL yes! The DOD and all federal agencies are now utilizing a new risk management framework developed by National…
Sending Automatic Email Notifications When An Active Directory Account Locks
Hello SealingTech readers! If you’re reading this blog you probably have some kind of an interest in how to notify your IT administrators via e-mail if an Active Directory account gets…
SealingTech CTF Walkthrough
This weekend, SealingTech ran a Capture-The-Flag event at BSidesCharm for 30 people. This event challenged members of the local InfoSec community to identify and exploit the vulnerabilities of a running system in our…
Could your news use a jolt?
Find out what’s happening across the cyber landscape every month with The Lightning Report.
Be privy to the latest trends and evolutions, along with strategies to safeguard your government agency or enterprise from cyber threats. Subscribe now.