Blog Industry: ICS

Kristina Dettwiler Product Marketing

Beyond Basic Isolation: The Power of Protocol Filtering Diodes

The Challenge: Secure One-Way Data Movement Without Compromise As cyber threats rapidly evolve, critical infrastructure security must advance to keep pace. One-way data transfer solution...
June 24, 2025

Testing the Limits: Inside Owl Cyber Defense’s SEER Lab

As artificial intelligence (AI) and quantum technologies reshape the cybersecurity landscape, the ability to identify and understand emerging vulnerabilities remains more critical than ev...
March 26, 2025
Steve Stratton Author | Retired Green Beret | Cybersecurity Advisor

Operation Skipjack – Part 1

Chapter One  INDOPACOM J3 Admiral Nikki Fury  Camp H. M. Smith Aiea, Hawaii  As I’m walking back to my office in the J3-Operations Directorate, I have a feeling something is not r...
March 24, 2025
Daniel Crum Director, Product Marketing

The Importance of Network Segmentation in Achieving Zero Trust

In today’s rapidly evolving cybersecurity landscape, government agencies face relentless pressure to protect sensitive information from increasingly sophisticated threats. Gone are the ...
October 2, 2024
Scott Coleman Vice President, Marketing

How can we harden networks without hardware?

Hoping to head off cyber threats that aren’t constrained by geographical or national boundaries, President Biden issued a statement urging the continued hardening of domestic cybersecur...
March 31, 2022

Defending Against the Unknown: Hardware-Enforced Security and Zero-Day Vulnerabilities

Until something even worse comes along, the Log4j remote code execution vulnerability will be the biggest story (and biggest headache) in cybersecurity. But even as security teams around ...
January 6, 2022

Owl’s Hardware-Enforced Security Provides Reliable Protection Against Log4j Vulnerabilities

Like thousands of other organizations, Owl Cyber Defense began reviewing the potential impact of the Log4j remote code execution vulnerability as soon as the vulnerability was announced. ...
December 17, 2021
Data Field Anomaly Detection
Tom Goodman and Jay Abdallah

Cybersecurity Was a *Hot* Topic at the Dubai Airshow

November saw the return of the Dubai Airshow, one of the biggest and most important events in the aviation industry. With an estimated 120,000 attendees, there was a true level of excitem...
December 14, 2021
Dennis Lanahan VP, Critical Infrastructure

Cybersecurity for Renewable Power Generation

The power industry is no stranger to cybersecurity. Given its essential role in every aspect of daily life, the industry follows strict guidelines for securing networks and devices that c...
November 23, 2021

Best Practices for OT-to-Cloud Connectivity

Cloud connectivity offers a wealth of benefits for energy providers and other critical infrastructure operators. Sending data from operational technology devices to the cloud allows asset...
August 9, 2021

Reliable Cybersecurity for Oil and Gas Pipelines

No one wants to repeat the week-long Colonial Pipeline shutdown, or—even worse—see a critical infrastructure cyber attack that manages to infiltrate a pipeline’s operational technol...
June 28, 2021

Air-Gapped Networks and Data Diodes

An air gap is the ultimate cybersecurity measure: a physical separation between a secure  network and any other computer or network. The purpose of an air gap is to eliminate any poss...
June 7, 2021
Prev
1 2 3 4
Next