standard

SealingTech CTF Walkthrough

This weekend, SealingTech ran a Capture-The-Flag event at BSidesCharm for 30 people. This event challenged members of the local InfoSec community to identify and exploit the vulnerabilities of a running system in our RackSpace cloud. The SealingTech CTF was a very exciting event for us to set up and observe people participating in. We had a lot of participants ask about the intended solution after the prizes had been awarded, so here it is.

// read more

standard

DEF CON 23: Humans, The Wall of Sheep, and The Number 23

The scene of DEF CON on August 6th, 2015 at the Paris Hotel in Las Vegas around 6:00am, was filled with an array of hackers and industry professionals alike. What may seem as an unlikely combination, in fact seamlessly combined into a strangely ordered, yet chaotic scene. Hundreds of individuals eagerly waited a few hours in a line that was six people wide, and zigzagged throughout an entire ballroom as they waited for the coveted DEF CON badge. DEF CON has its’ own way of categorizing the attendees: Goons, Humans, and Inhumans. As first time “Humans” at DEF CON, we quickly realized that this ordered chaos/line waiting would be consistent throughout the event.

// read more

standard

Defensive Cyber Operations: Ground Zeroes

In an era plagued by thieves, criminals, and script kiddies, the need for securing information has increased exponentially. The market is teeming with products that are advertised to adequately secure your systems, data stores, sensitive information, etc. independently or in tandem with a bevy of other products. In the modern business world, global, interconnected networks pose a need for secure operations platforms and vehicles (confidentiality, integrity, availability).  Absence of these crucial platforms and vehicles could have a significantly adverse impact on an organization, especially as the world becomes more reliant on these networks to perform their intended functions. Systems administrators, programmers, security analysts, computer scientists, etc. are integral to preserving the functionality, efficiency, and security of these networks, as is constant maintenance and monitoring.

// read more

standard

AFCEA Defensive Cyber Operations Symposium: Bringing Light to DoD Missions?

The AFCEA Defensive Cyber Operations Symposium proved to be a successful event for another year in a row.  Having been rescheduled due to the Baltimore political climate in May, the event took place over three days from June 16-18 at the Convention Center in the heart of the city with an exceptional turn-out.  The location, a facility of immense capacity surrounded on all sides by lively intersections and corporate offices was wholly appropriate, symbolizing the collaboration of our vast government and the bustling, innovative industry that encompasses it; a partnership crucial to ensuring effective solutions to operate, secure, and defend our networks.

// read more

standard

Mapping Out the Risk Management Framework

The days of DIACAP are phasing out. No more MAC and CL yes! The DOD and all federal agencies are now utilizing a new risk management framework developed by National Institute of Standards (NIST) in collaboration with the Office of the Director of National Intelligence (ODNI), the Department of Defense (DOD) and the Committee on National Security Systems (CNSS).

// read more