STL's mission: Deliver innovative IT services and reliable staffing solutions to our clients. A lot of famous companies were started in a garage or basement. We may not be famous yet, but STL’s story is similar. An acronym for Sky’s The Limit, STL was founded in 1991 by Katie and Tim Norman—in their basement.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

FBI RAIDS HOME OF SUSPECTED SECOND WHISTLEBLOWER

None | October 29, 2014

news image

Federal prosecutors have opened a criminal investigation after the FBI raided the home of a suspected second whistleblower who passed on secret government documents about a terror watch list....

Read More

CARDINALS FIRE SCOUTING DIRECTOR AS HACKING INVESTIGATIONS CONTINUE

stltoday | July 03, 2015

news image

The St. Louis Cardinals have terminated the contract of their scouting director, Chris Correa, as investigations continue into alleged hacking of a Houston Astros database....

Read More

CYBERSECURITY FACES MOSTLY 'POST-PC' THREATS

INFOSECURITY MAGAZINE | January 23, 2013

news image

It is a “post-PC” world characterized by pervasive mobility and a range of smart devices that extend beyond the Windows machine paradigm. And for that reason, Trend Micro is warning in its 2012 Annual Security Roundup that the signs very clearly point to the biggest growth area for cyber-criminals like in the world beyond the desktop environment....

Read More

CYBER SECURITY FIRM FINDS 'MULTIPLE VULNERABILITIES' IN TIK TOK SECURITY

abc6onyourside | January 15, 2020

news image

A cybersecurity firm tested the security of Tik Tok and found "multiple vulnerabilities" in the app's code, allowing for security loopholes and hacking accounts. Check Point Research published their findings on the app, showing the security concerns. The firm's research shows they were able to manipulate code to mess with accounts' contents, delete and upload videos without the account owner's consent, make previously "hidden" videos public, and access persona...

Read More
news image

FBI RAIDS HOME OF SUSPECTED SECOND WHISTLEBLOWER

None | October 29, 2014

Federal prosecutors have opened a criminal investigation after the FBI raided the home of a suspected second whistleblower who passed on secret government documents about a terror watch list....

Read More
news image

CARDINALS FIRE SCOUTING DIRECTOR AS HACKING INVESTIGATIONS CONTINUE

stltoday | July 03, 2015

The St. Louis Cardinals have terminated the contract of their scouting director, Chris Correa, as investigations continue into alleged hacking of a Houston Astros database....

Read More
news image

CYBERSECURITY FACES MOSTLY 'POST-PC' THREATS

INFOSECURITY MAGAZINE | January 23, 2013

It is a “post-PC” world characterized by pervasive mobility and a range of smart devices that extend beyond the Windows machine paradigm. And for that reason, Trend Micro is warning in its 2012 Annual Security Roundup that the signs very clearly point to the biggest growth area for cyber-criminals like in the world beyond the desktop environment....

Read More
news image

CYBER SECURITY FIRM FINDS 'MULTIPLE VULNERABILITIES' IN TIK TOK SECURITY

abc6onyourside | January 15, 2020

A cybersecurity firm tested the security of Tik Tok and found "multiple vulnerabilities" in the app's code, allowing for security loopholes and hacking accounts. Check Point Research published their findings on the app, showing the security concerns. The firm's research shows they were able to manipulate code to mess with accounts' contents, delete and upload videos without the account owner's consent, make previously "hidden" videos public, and access persona...

Read More