Blog
Learn about what makes our company culture unique and why SealingTech employees love working here.
Building Large Language Models in the Cyber Domain
At SealingTech, we’re always looking for ways to share our knowledge and expertise with our customers and the cybersecurity community. As a Software Engineer at SealingTech, I help develop new…
Future-Proofing Quality in a Rapidly Changing Industry
Innovation moves fast. In the world of cybersecurity manufacturing, tools, technologies, and threats evolve at a pace that can make yesterday’s best practice—today’s blind spot. At SealingTech, we see this…
Ransomware as a Service (RaaS): Explained
The days when cybercriminals built single-use ransomware and manually pushed it into one organization’s network are gone. Criminals still extort ransoms – and less technical actors still deploy traditional strings…
Promoting National Cybersecurity Awareness Year-Round
Since 2004, the US observes National Cybersecurity Awareness Month (NCSAM) in October. A collaborative effort established between the Federal Government and commercial industry to ensure every American has the resources needed…
Industrial Control Systems Cybersecurity: A Guide to Best Practices
Industrial control systems (ICS) keep the modern world running. They meter electricity across power grids, regulate water quality at treatment facilities, and orchestrate precision manufacturing on factory floors. They also…
On the Road: Breakthrough Innovations that Accelerate Missions
Throughout the year, the SealingTech team travels to events like TechNet Augusta, DAFITC, and the National Homeland Security Conference (NHSC) to introduce breakthrough innovations and build partnerships that accelerate missions…
A Guide to Critical Infrastructure Cybersecurity
Clean water. Reliable power. Air traffic control. Cellular networks. These “silent services” make modern life possible – until they don’t. When the cybersecurity measures protecting critical systems are compromised, everyday…
Covering Your Bases: IT/OT Convergence
Imagine a factory where the machinery itself schedules repairs before a breakdown ever occurs, or a power grid that reroutes electricity to prevent outages during a storm. This is not…
Threat Hunting vs. Threat Intelligence: Key Differences and Synergies
Your security operations center is flooded with alerts, yet you have a persistent feeling that the most significant threats are the ones not making any noise. This gap between known…
Could your news use a jolt?
Find out what’s happening across the cyber landscape every month with The Lightning Report.
Be privy to the latest trends and evolutions, along with strategies to safeguard your government agency or enterprise from cyber threats. Subscribe now.