Technology Exchange

Defensive Cyber Operations: Cyberwarfare Explained

With the average ransom payment almost doubling from $812,380 in 2022 to $1,542,333 in 2023, and with DDoS attacks and malicious bot traffic rising, it’s even more alarming that, in…

Learn More

Implementing Security Controls: An Intro to JSIG

Occasions often arise requiring information system owners to be diligent when it comes to protecting their data and projects. Researchers feel burdened by having to develop an information security plan…

Learn More

Cross Domain Solutions and Weapons Systems

The next security domain in human protection Often, the sharing of potentially sensitive information between two security domains with varying classifications or security levels needs to happen. A high-speed system…

Learn More

CAN Bus Vulnerabilities Raise Threats for Cars and Tanks  

In April 2023, media outlets reported escalating high-end car thefts using a technique that caused a vehicle’s immobilizer system to malfunction. The attack exploited a vulnerability in the car’s control…

Learn More

Enhancing Network Security with Machine Learning: Device Classification and Anomaly Detection

In today’s network security landscape, machine learning plays a vital role in detecting anomalies and identifying potential threats by analyzing behavior patterns. Machine learning-based anomaly detection is rapidly gaining popularity…

Learn More

Computational Fluid Dynamics within SealingTech Servers

–  By Austin McAlexander SealingTech is proud to provide our customers and mission partners with industry leading carry-on compliant server hardware while maintaining the performance characteristics of traditional data center…

Learn More

Scenario-Based Training:  Creating a Hands-On Course for Network & Security Operators 

Over the past year and a half, we have created content and held training events for Network and Security Operators.  We call our events “Scenario-Based Training” because we provide the participants with situations related to a security or network incident. We have found…

Learn More

Understanding PCI DSS and the Importance of Compliance

The Payment Card Industry Data Security Standard (PCI DSS) was originally established in 2004 as a standardization of security practices for any organization that handles or uses payment collection via…

Learn More

Defensive Cyber Operations: Ground Zeroes

In an era plagued by thieves, criminals, and script kiddies, the need for securing information has increased exponentially. The market is teeming with products that are advertised to adequately secure…

Learn More