Blog

SealingTech CTF Walkthrough

This weekend, SealingTech ran a Capture-The-Flag event at BSidesCharm for 30 people. This event challenged members of the local InfoSec community to identify and exploit the vulnerabilities of a running system in our RackSpace cloud. The SealingTech CTF was a very exciting event for us to set up and observe people participating in. We had a lot of participants…

Read More...

DEF CON 23: Humans, The Wall of Sheep, and The Number 23

The scene of DEF CON on August 6th, 2015 at the Paris Hotel in Las Vegas around 6:00am, was filled with an array of hackers and industry professionals alike. What may seem as an unlikely combination, in fact seamlessly combined into a strangely ordered, yet chaotic scene. Hundreds of individuals eagerly waited a few hours…

Read More...

AFCEA Defensive Cyber Operations Symposium: Bringing Light to DoD Missions?

The AFCEA Defensive Cyber Operations Symposium proved to be a successful event for another year in a row.  Having been rescheduled due to the Baltimore political climate in May, the event took place over three days from June 16-18 at the Convention Center in the heart of the city with an exceptional turn-out.  The location,…

Read More...

The Internet of Things: Securing an Interconnected World

For those of you who haven’t heard yet, the Internet of Things (IoT) is the enablement of any-to-any connectivity between a wide variety of sensors and devices. The first surge of connectivity was on the user end (homes and offices), allowing them to connect to their corporate HQ through a wired Internet connection. Then the…

Read More...

BSides Charm City 2015 – The Power of Effective Communication

The scene on April 11th, 2015 at Howard Community College’s Gateway Building – Charles I. Ecker Business Training Center was packed with faded computer event t-shirts, beards, the occasional pirate hat, yet some of the most successful people in the information security industry were in attendance.

Read More...

How to Change Password in a Nested RDP Session

Practicing good IT security is not always convenient. It can be tedious to change passwords without a dedicated password tool, but password rotation is a necessary step.  Even though I don’t have an ideal tool for this task, I will show you how to rotate the local admin password on one of our servers.  So,…

Read More...

Luck isn’t a Cyber Security Strategy

Today is St. Patrick’s Day, a day that conjures up images of leprechauns and four-leaf clovers, which legend says can bring good fortune to those who find them. So today might be a good day to ask yourself this question: Are you relying on the luck of the Irish to keep your organization safe from…

Read More...