Blog
Learn about what makes our company culture unique and why SealingTech employees love working here.
How to Set Up a Rootless GitHub Container Building Pipeline
When developing containerized applications for government customers, certain security and software requirements must be taken into consideration. The government tries to move toward Red Hat’s Universal Base Images (UBIs) to…
Defensive Cyber Operations: Cyberwarfare Explained
With the average ransom payment almost doubling from $812,380 in 2022 to $1,542,333 in 2023, and with DDoS attacks and malicious bot traffic rising, it’s even more alarming that, in…
Implementing Security Controls: An Intro to JSIG
Occasions often arise requiring information system owners to be diligent when it comes to protecting their data and projects. Researchers feel burdened by having to develop an information security plan…
Cross Domain Solutions and Weapons Systems
The next security domain in human protection Often, the sharing of potentially sensitive information between two security domains with varying classifications or security levels needs to happen. A high-speed system…
The Undetected Breach
On Monday, your customers unknowingly install malicious updates permitting malware to spread throughout your system undetected. Tuesday, the single breach of security at your company triggers a supply chain incident…
Mapping Out the NIST Risk Management Framework (RMF)
The days of the DoD Information Assurance Certification and Accreditation Process (DIACAP) are phasing out. The DoD and all federal agencies are now using a new risk management framework (RMF)…
CAN Bus Vulnerabilities Raise Threats for Cars and Tanks
In April 2023, media outlets reported escalating high-end car thefts using a technique that caused a vehicle’s immobilizer system to malfunction. The attack exploited a vulnerability in the car’s control…
Cyber Mission Asia ReCap: SealingTech Represents the United States and Advances Global Cybersecurity
In August 2023, SealingTech was selected to represent the United States at Cyber Mission Asia in Taiwan, South Korea, and Japan. This prestigious event, which was requested by the host…
Cross Domain Solutions: What They Are, How They Work, and What Makes Them Effective
Whether in military or intelligence missions or in globally linked enterprises, we increasingly rely on secure information sharing across different sectors for effective execution. However, the very agencies and industries…
Could your news use a jolt?
Find out what’s happening across the cyber landscape every month with The Lightning Report.
Be privy to the latest trends and evolutions, along with strategies to safeguard your government agency or enterprise from cyber threats. Subscribe now.