SealingTech Insights

Press Releases

Sealing Technologies Inc. Welcomes Quark Security Inc. & Their Cyber Security Experts

June 26, 2020

COLUMBIA, MD – Sealing Technologies Inc. (“SealingTech”) has officiated the acquisition of Quark Security Inc. (“Quark”), as of Friday, December 6th, 2019. SealingTech and Quark will be working to unify their expertise and development practices with their engineering, integration, sales, and business management teams through the merging of networks, financial systems, and contracts. As leading…

Read more

Small Cybersecurity Business, Sealing Technologies, Inc., Urges Community Organizations to Donate

May 28, 2020

COLUMBIA, Md., May 14, 2020 /PRNewswire/ — Sealing Technologies, Inc. (SealingTech) urges local Howard County organizations to donate and provide relief to the most vulnerable residents of the Howard County community. Your browser does not support the video tag. Director of the HoCo Food Bank, Paul McElderry, states that a significant increase of locals in…

Read more

Latest News and Research

Swipe right…into your next job

February 14, 2018

Maybe it’s my recent re-introduction into singledom, or maybe it’s because today is Valentine’s Day, but I can’t help but notice the similarities between dating and looking for a job.  I’ve introduced my best friends to their now spouses and I spend my work-day matching the right people with the right positions.  Recruiters are born…

Read more

Interning at SealingTech: Two Insiders’ Tales

February 1, 2018

SealingTech’s Internship Program takes place over the course of 11 weeks from May to August. This past year, two talented computer engineers were selected to participate in the summer 2017 program and became a part of SealingTech’s legacy. Here are their tales: The Project SealingTech’s 2017 Summer Internship Program, was designed around an internal R&D…

Read more

Adventures in Suricata (Part 1): Low Cost Intrusion Detection System

May 9, 2016

Welcome to the Adventures in Suricata series! Over the past couple months I have been exploring Suricata, an open source Intrusion Detection System (IDS), by standing it up in my virtualized ESXi server at home. By sharing my own experiences with you, I hope to overcome the misconception that IDS is only viable for large…

Read more

SealingTech CTF Walkthrough

April 25, 2016

This weekend, SealingTech ran a Capture-The-Flag event at BSidesCharm for 30 people. This event challenged members of the local InfoSec community to identify and exploit the vulnerabilities of a running system in our RackSpace cloud. The SealingTech CTF was a very exciting event for us to set up and observe people participating in. We had a lot of participants…

Read more

Understanding PCI DSS and the Importance of Compliance

August 21, 2015

The Payment Card Industry Data Security Standard (PCI DSS) was originally established in 2004 as a standardization of security practices for any organization that handles or uses payment collection via credit cards. This standardization is required by all major credit card carriers and is regulated by the Payment Card Security Standards Council (PCI SSC). This…

Read more

DEF CON 23: Humans, The Wall of Sheep, and The Number 23

August 18, 2015

The scene of DEF CON on August 6th, 2015 at the Paris Hotel in Las Vegas around 6:00am, was filled with an array of hackers and industry professionals alike. What may seem as an unlikely combination, in fact seamlessly combined into a strangely ordered, yet chaotic scene. Hundreds of individuals eagerly waited a few hours…

Read more

Defensive Cyber Operations: Ground Zeroes

August 10, 2015

In an era plagued by thieves, criminals, and script kiddies, the need for securing information has increased exponentially. The market is teeming with products that are advertised to adequately secure your systems, data stores, sensitive information, etc. independently or in tandem with a bevy of other products. In the modern business world, global, interconnected networks…

Read more

AFCEA Defensive Cyber Operations Symposium: Bringing Light to DoD Missions?

July 8, 2015

The AFCEA Defensive Cyber Operations Symposium proved to be a successful event for another year in a row.  Having been rescheduled due to the Baltimore political climate in May, the event took place over three days from June 16-18 at the Convention Center in the heart of the city with an exceptional turn-out.  The location,…

Read more

Host Based Risk Scoring (Part 2): Calculating the Vulnerability Level of a System

June 16, 2015

This is Part 2 of a three part series. If you haven’t checked out Part 1, check out the post at Host Based Risk Scoring (Part 1). Please note that information in these articles are taken from my personal ideas and experience. I’d love to hear your comments and thoughts on these concepts. Feel free…

Read more