Blog
Learn about what makes our company culture unique and why SealingTech employees love working here.
Sending Automatic Email Notifications When An Active Directory Account Locks
Hello SealingTech readers! If you’re reading this blog you probably have some kind of an interest in how to notify your IT administrators via e-mail if an Active Directory account gets…
SealingTech CTF Walkthrough
This weekend, SealingTech ran a Capture-The-Flag event at BSidesCharm for 30 people. This event challenged members of the local InfoSec community to identify and exploit the vulnerabilities of a running system in our…
DEF CON 23: Humans, The Wall of Sheep, and The Number 23
The scene of DEF CON on August 6th, 2015 at the Paris Hotel in Las Vegas around 6:00am, was filled with an array of hackers and industry professionals alike. What…
AFCEA Defensive Cyber Operations Symposium: Bringing Light to DoD Missions?
The AFCEA Defensive Cyber Operations Symposium proved to be a successful event for another year in a row. Having been rescheduled due to the Baltimore political climate in May, the…
The Internet of Things: Securing an Interconnected World
For those of you who haven’t heard yet, the Internet of Things (IoT) is the enablement of any-to-any connectivity between a wide variety of sensors and devices. The first surge…
BSides Charm City 2015 – The Power of Effective Communication
The scene on April 11th, 2015 at Howard Community College’s Gateway Building – Charles I. Ecker Business Training Center was packed with faded computer event t-shirts, beards, the occasional pirate…
How to Change Password in a Nested RDP Session
Practicing good IT security is not always convenient. It can be tedious to change passwords without a dedicated password tool, but password rotation is a necessary step. Even though I…
Luck isn’t a Cyber Security Strategy
Today is St. Patrick’s Day, a day that conjures up images of leprechauns and four-leaf clovers, which legend says can bring good fortune to those who find them. So today…
Could your news use a jolt?
Find out what’s happening across the cyber landscape every month with The Lightning Report.
Be privy to the latest trends and evolutions, along with strategies to safeguard your government agency or enterprise from cyber threats. Subscribe now.