Blog
Learn about what makes our company culture unique and why SealingTech employees love working here.
The Growth of Social Media and Our Collective Arrival at an Event Horizon of Calamitous Impact
Social Media and a Different Perspective In the cybersecurity landscape – cyberscape – information dominance is the key to obtaining the “keys to the kingdom,” as the saying goes. For…
Meet Donny Brittingham, Network Security Engineer II in SEM
What do you do for fun? In my free time, I enjoy watching sports, spending time with my family, and VR Boxing. What is your greatest challenge at SealingTech and…
Meet Danielle Chinnici, SealingTech Accounting Manager
What team do you support at SealingTech? I support the Accounting and Finance team at SealingTech. What was your greatest challenge at SealingTech and how did you handle it? I…
Max Schmidt: From Intern to Product Manager in 3 Years
What was your greatest challenge at SealingTech and how did you handle it? Over just the last 3 years of my employment at Sealing Technologies, I have been able to…
Introducing IT Support Manager Eric McClain
The purpose of this blog post is to introduce you to the people at SealingTech who daily perform their tasks to accomplish their mission of serving you. Here we present…
Gaming Industry Cybersecurity Risks and How to Prepare for Them
Increasingly, games and gamers are being hit by cyberattacks in the video gaming sector. This spans PC, mobile, and console gaming alike, although attacks are more frequent against PC gamers…
2020 MD Cyber Awards Finalists
2020 MD Cyber Awards Finalists SealingTech Selected for “Innovator of the Year” Award The Sealing Technologies, Inc. (SealingTech) team has been recognized for their outstanding efforts in providing innovative, defensive…
Virtual DEFCON28 – SealingTech Engineers Win 2nd Place At Virtual DEFCON28
Demonstrating their skills and expertise, some of the most valuable and skilled members of SealingTech’s engineering team participated in talks and CTF’s (Capture-the-Flags) as they represented the company and did…
Scenario-Based Training: Creating a Hands-On Course for Network & Security Operators
Over the past year and a half, we have created content and held training events for Network and Security Operators. We call our events “Scenario-Based Training” because we provide the participants with situations related to a security or network incident. We have found…
Could your news use a jolt?
Find out what’s happening across the cyber landscape every month with The Lightning Report.
Be privy to the latest trends and evolutions, along with strategies to safeguard your government agency or enterprise from cyber threats. Subscribe now.