Blog

Host Based Risk Scoring (Part 2): Calculating the Vulnerability Level of a System

This is Part 2 of the Host Based Risk Scoring series. If you haven’t checked out Part 1, check out the post at Host Based Risk Scoring (Part 1). Please note that information in these articles are taken from my personal ideas and experience. I’d love to hear your comments and thoughts on these concepts….

Read More...

Adventures in Suricata (Part 1): Low Cost Intrusion Detection System

Welcome to the Adventures in Suricata series! Over the past couple months I have been exploring Suricata, an open source Intrusion Detection System (IDS), by standing it up in my virtualized ESXi server at home. By sharing my own experiences with you, I hope to overcome the misconception that IDS is only viable for large…

Read More...

BSidesCharm 2018

We had such a great time at BSidesCharm 2018 – so much so that I felt compelled to write about it.  Over the past couple years I have attended this event on behalf of SealingTech, and I have seen the conference grow and change locations. The conference had a little different feel to it this…

Read More...

Host Based Risk Scoring (Part 1): How do you calculate Risk?

Hey all! This is the first post in a series about the concepts of a Host Based Risk Scoring System. This is an idea I had a few years ago, while doing a lot of testing of McAfee and Symantec host products. The work involved trying to determine how effective the products were against varying…

Read More...

Swipe right…into your next job

Maybe it’s my recent re-introduction into singledom, or maybe it’s because today is Valentine’s Day, but I can’t help but notice the similarities between dating and looking for a job.  I’ve introduced my best friends to their now spouses and I spend my work-day matching the right people with the right positions.  Recruiters are born…

Read More...

Interning at SealingTech: Two Insiders’ Tales

SealingTech’s Internship Program takes place over the course of 11 weeks from May to August. This past year, two talented computer engineers were selected to participate in the summer 2017 program and became a part of SealingTech’s legacy. Here are their tales: The Project SealingTech’s 2017 Summer Internship Program, was designed around an internal R&D…

Read More...

Mapping Out the Risk Management Framework (RMF)

The days of DIACAP are phasing out. No more MAC and CL yes! The DOD and all federal agencies are now utilizing a new risk management framework developed by National Institute of Standards (NIST) in collaboration with the Office of the Director of National Intelligence (ODNI), the Department of Defense (DOD) and the Committee on…

Read More...

Sending Automatic Email Notifications When An Active Directory Account Locks

Hello SealingTech readers! If you’re reading this blog you probably have some kind of an interest in how to notify your IT administrators via e-mail if an Active Directory account gets locked out in your environment. If you’re not interested and somehow wound up here, feel free to continue reading, you might just learn something!

Read More...

SealingTech CTF Walkthrough

This weekend, SealingTech ran a Capture-The-Flag event at BSidesCharm for 30 people. This event challenged members of the local InfoSec community to identify and exploit the vulnerabilities of a running system in our RackSpace cloud. The SealingTech CTF was a very exciting event for us to set up and observe people participating in. We had a lot of participants…

Read More...

DEF CON 23: Humans, The Wall of Sheep, and The Number 23

The scene of DEF CON on August 6th, 2015 at the Paris Hotel in Las Vegas around 6:00am, was filled with an array of hackers and industry professionals alike. What may seem as an unlikely combination, in fact seamlessly combined into a strangely ordered, yet chaotic scene. Hundreds of individuals eagerly waited a few hours…

Read More...