SealingTech Insights

Press Releases

Sealing Technologies Inc. Welcomes Quark Security Inc. & Their Cyber Security Experts

June 26, 2020

COLUMBIA, MD – Sealing Technologies Inc. (“SealingTech”) has officiated the acquisition of Quark Security Inc. (“Quark”), as of Friday, December 6th, 2019. SealingTech and Quark will be working to unify their expertise and development practices with their engineering, integration, sales, and business management teams through the merging of networks, financial systems, and contracts. As leading…

Read more

Small Cybersecurity Business, Sealing Technologies, Inc., Urges Community Organizations to Donate

May 28, 2020

COLUMBIA, Md., May 14, 2020 /PRNewswire/ — Sealing Technologies, Inc. (SealingTech) urges local Howard County organizations to donate and provide relief to the most vulnerable residents of the Howard County community. Your browser does not support the video tag. Director of the HoCo Food Bank, Paul McElderry, states that a significant increase of locals in…

Read more

Latest News and Research

Mapping Out the Risk Management Framework

June 12, 2015

The days of DIACAP are phasing out. No more MAC and CL yes! The DOD and all federal agencies are now utilizing a new risk management framework developed by National Institute of Standards (NIST) in collaboration with the Office of the Director of National Intelligence (ODNI), the Department of Defense (DOD) and the Committee on…

Read more

Sending Automatic Email Notifications When An Active Directory Account Locks

May 22, 2015

Hello SealingTech readers! If you’re reading this blog you probably have some kind of an interest in how to notify your IT administrators via e-mail if an Active Directory account gets locked out in your environment. If you’re not interested and somehow wound up here, feel free to continue reading, you might just learn something!

Read more

The Internet of Things: Securing an Interconnected World

May 20, 2015

For those of you who haven’t heard yet, the Internet of Things (IoT) is the enablement of any-to-any connectivity between a wide variety of sensors and devices. The first surge of connectivity was on the user end (homes and offices), allowing them to connect to their corporate HQ through a wired Internet connection. Then the…

Read more

BSides Charm City 2015 – The Power of Effective Communication

April 17, 2015

The scene on April 11th, 2015 at Howard Community College’s Gateway Building – Charles I. Ecker Business Training Center was packed with faded computer event t-shirts, beards, the occasional pirate hat, yet some of the most successful people in the information security industry were in attendance.

Read more

How-To: Change Password in a Nested RDP Session

April 14, 2015

Practicing good IT security is not always convenient. It can be tedious to change passwords without a dedicated password tool, but password rotation is a necessary step.  Even though I don’t have an ideal tool for this task, I will show you how to rotate the local admin password on one of our servers.  So, let’s…

Read more

Luck isn’t a Cyber Security Strategy

March 17, 2015

Today is St. Patrick’s Day, a day that conjures up images of leprechauns and four-leaf clovers, which legend says can bring good fortune to those who find them. So today might be a good day to ask yourself this question: Are you relying on the luck of the Irish to keep your organization safe from…

Read more

Host Based Risk Scoring (Part 1): How do you calculate Risk?

March 9, 2015

Hey all! This is the first post in a series about the concepts of a Host Based Risk Scoring System. This is an idea I had a few years ago (Spring 2012), while doing a lot of testing of McAfee and Symantec host products. The work involved trying to determine how effective the products were against…

Read more

Cloud Security (Part 1): Passive Security Monitoring in RackSpace

March 9, 2015

This is Part 1 of our “Cloud Security” series, with a goal of setting up a simple passive security monitoring capability in the cloud. Future posts will show how to enable out-of-band management, as well as setting up the monitoring services themselves. Enjoy!

Read more