Technology Exchange
Cybersecurity for Critical Infrastructure Demystified
In recent years, the cybersecurity of Critical Infrastructure has shifted from a niche concern to a national emergency prompted by the escalating number and severity of cyberattacks targeting essential services….
The Importance of ISO 9001:2015 to Cybersecurity
SealingTech recently completed a successful recertification audit and renewal of our ISO 9001:2015 certificate, resulting in zero non-conformities during a weeklong external evaluation. Over the past three years, ISO 9001:2015…
How to Set Up a Rootless GitHub Container Building Pipeline
When developing containerized applications for government customers, certain security and software requirements must be taken into consideration. The government tries to move toward Red Hat’s Universal Base Images (UBIs) to…
Defensive Cyber Operations: Cyberwarfare Explained
With the average ransom payment almost doubling from $812,380 in 2022 to $1,542,333 in 2023, and with DDoS attacks and malicious bot traffic rising, it’s even more alarming that, in…
Implementing Security Controls: An Intro to JSIG
Occasions often arise requiring information system owners to be diligent when it comes to protecting their data and projects. Researchers feel burdened by having to develop an information security plan…
Cross Domain Solutions and Weapons Systems
The next security domain in human protection Often, the sharing of potentially sensitive information between two security domains with varying classifications or security levels needs to happen. A high-speed system…
CAN Bus Vulnerabilities Raise Threats for Cars and Tanks
In April 2023, media outlets reported escalating high-end car thefts using a technique that caused a vehicle’s immobilizer system to malfunction. The attack exploited a vulnerability in the car’s control…
Enhancing Network Security with Machine Learning: Device Classification and Anomaly Detection
In today’s network security landscape, machine learning plays a vital role in detecting anomalies and identifying potential threats by analyzing behavior patterns. Machine learning-based anomaly detection is rapidly gaining popularity…
Computational Fluid Dynamics within SealingTech Servers
– By Austin McAlexander SealingTech is proud to provide our customers and mission partners with industry leading carry-on compliant server hardware while maintaining the performance characteristics of traditional data center…