Technology Exchange
The Call for Explainable AI
Enhancing Network Visibility with Machine Learning Artificial intelligence (AI) and machine learning are transforming business processes across industries. For many organizations, data has become their most valuable asset. The ability…
Unsupervised Learning for Cybersecurity
Dashboards and automated alerts remain well-established fundamental components of nearly every cybersecurity team’s toolbelt. Peel back the layers of a network monitoring tool suite, and you’ll discover that every team…
Operator X: An Intern Experience
SealingTech’s exciting new innovation Operator X is a chat interface built to assist cyber operators by bridging knowledge gaps via the use of cutting-edge generative AI tools and techniques. It…
Training Open-Source Large Language Models for Cybersecurity
Large language models (LLMs) continue to revolutionize the field of natural language processing (NLP). With the success of platforms such as OpenAI’s ChatGPT and Google’s Gemini, professionals in nearly every…
Operator X: Bridging the Gap Between Intent and Knowledge with Cutting-Edge LLMs
Cyber operators in the Department of Defense (DoD) combat some of the most sophisticated cyber actors in the world. Cyber protection teams (CPTs) tend to be tasked with building, operating,…
Classifying Domain Generation Algorithm Domains with Machine Learning
Domain Generation Algorithms (DGAs) pose a significant challenge for cybersecurity professionals. These algorithms generate a large number of seemingly random domain names, allowing threat actors to constantly evade detection and…
Hybrid Cloud Security with DevSecOps: Transforming Data Security
As hybrid cloud environments promise more opportunities for both military and private applications, their setups are growing increasingly complex, presenting unique challenges. SealingTech’s implementation of DevSecOps principles is at the…
Cybersecurity in Cloud Modernization and Operations
While cloud modernization promises significant advantages, it also poses countless challenges, particularly in integrating legacy systems and ensuring robust cybersecurity. Both government agencies and high-compliance organizations must navigate complex issues…