Blog Industry: Financial Services
Amalia Rosen
Trusted Data Under Fire: What Our Audience Taught Us About Securing the Tactical Edge
In modern defense operations, trusted data is no longer a nice‑to‑have; it is the backbone of decision advantage at every echelon, from headquarters to the tactical edge. As missions ...
Kristina Dettwiler Product Marketing
7 Mission Bottlenecks You Can Eliminate Now with Protocol Filtering Diodes
Security should clear bottlenecks—not create them. Yet for many missions, legacy tools have become chokepoints that stall data and force teams into risky workarounds just to keep up wit...
Kristina Dettwiler Product Marketing
Just Released: Owl Talon v3.4.0.0 Raises the Bar Again for One-Way Security
As attack tactics escalate, your defenses must raise the bar on security, adaptability, and flexibility—and Owl data diodes are purpose-built to help you do exactly that. With O...
Scott Orton CEO, Owl Cyber Defense
The National Cyber Strategy: “Nuclear-Grade” is the Way Forward
Late March 6, 2026, the White House released a new National Cybersecurity Strategy. While the strategy outlines a broad and ambitious roadmap for our digital future, the real challenge...
Steve Stratton Author | Retired Green Beret | Cybersecurity Advisor
Operation Skipjack – Part 1
Chapter One
INDOPACOM J3 Admiral Nikki Fury
Camp H. M. Smith Aiea, Hawaii
As I’m walking back to my office in the J3-Operations Directorate, I have a feeling something is not rig...
Daniel Crum Director, Product Marketing
Hidden Threats in AI Data: Protecting Against Embedded Steganography
As the 2023 Executive Order on Artificial Intelligence (AI) specifically lays out, "Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks." On...
John McKeon Business Development Manager - Financial Services
How Can SIEM Work with Air-Gapped Networks?
To keep a critical network safe, a common practice has traditionally been to establish an air gap – in other words, disconnect that network from “untrusted” or less secure networks,...
John McKeon Business Development Manager - Financial Services
Comments on the Upcoming NIST Special Publication 1800-25A
As you may or may not be aware, the National Cybersecurity Center of Excellence (NCCoE) at NIST has released a draft version of NIST Cybersecurity Practice Guide SP 1800-25 - Identifying ...
Gary McGibbon Business Development Manager - Financial Services
Integrating Digital Transformation and Cybersecurity Transformation in Financial Services
Financial services institutions are now wading through the latest wave of operational changes that focus on customer centricity and streamlined core operations – digital transformation ...
Gary McGibbon Business Development Manager - Financial Services
Capital One as a Canary in the Cloud Coal Mine: Part 3 – Conclusions
If the Capital One sysadmin had just changed the WAF password...
In the final part of our blog series on the Capital One breach, I want to discuss the conclusions reached based on the vu...
Gary McGibbon Business Development Manager - Financial Services
Capital One as a Canary in the Cloud Coal Mine: Part 2 – Findings
"That is a pretty egregious oversight."
In the second part of our three part series on the Capital One breach, I want to discuss the vulnerabilities and other elements that went into the...
Gary McGibbon Business Development Manager - Financial Services
Capital One as a Canary in the Cloud Coal Mine: Part 1 – What Happened?
Was Capital One an aberration?
Recently released data from the 2019 IBM/Ponemon Cost of a Data Breach Report identifies financial services institutions as one of the top two industry gro...