Blog Industry: Network Security

Amalia Rosen

Securing Power Plants in a Connected World: How Owl Talon One™ Gives Grid Operators Peace of Mind

The Challenge: Securing Power Plant Operations in a Hyper-Connected Grid Operators of today’s power plants are under relentless pressure. As utilities become increasingly interconnecte...
July 18, 2025
Kristina Dettwiler Product Marketing

Beyond Basic Isolation: The Power of Protocol Filtering Diodes

The Challenge: Secure One-Way Data Movement Without Compromise As cyber threats rapidly evolve, critical infrastructure security must advance to keep pace. One-way data transfer solution...
June 24, 2025

Top 7 Cybersecurity and Resilience Takeaways from DISTRIBUTECH 2025 for Critical Infrastructure Leaders

The Shift Toward Operational Resilience in Critical Infrastructure Whether you're responsible for maintaining uptime in the field or ensuring secure data flow across your network archite...
April 3, 2025

Testing the Limits: Inside Owl Cyber Defense’s SEER Lab

As artificial intelligence (AI) and quantum technologies reshape the cybersecurity landscape, the ability to identify and understand emerging vulnerabilities remains more critical than ev...
March 26, 2025
Steve Stratton Author | Retired Green Beret | Cybersecurity Advisor

Operation Skipjack – Part 1

Chapter One  INDOPACOM J3 Admiral Nikki Fury Camp H. M. Smith Aiea, Hawaii As I’m walking back to my office in the J3-Operations Directorate, I have a feeling something is not rig...
March 24, 2025
Daniel Crum Director, Product Marketing

Hidden Threats in AI Data: Protecting Against Embedded Steganography

As the 2023 Executive Order on Artificial Intelligence (AI) specifically lays out, "Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks." On...
November 19, 2024
Daniel Crum Director, Product Marketing

The Importance of Network Segmentation in Achieving Zero Trust

In today’s rapidly evolving cybersecurity landscape, government agencies face relentless pressure to protect sensitive information from increasingly sophisticated threats. Gone are the ...
October 2, 2024

Defending Against the Unknown: Hardware-Enforced Security and Zero-Day Vulnerabilities

Until something even worse comes along, the Log4j remote code execution vulnerability will be the biggest story (and biggest headache) in cybersecurity. But even as security teams around ...
January 6, 2022

After Two Years, DoDIIS Returns to an Environment of Changing Priorities

The Department of Defense Intelligence Information Systems (DoDIIS) conference took place in mid-December in Phoenix, AZ. It was great to reconvene with many colleagues we hadn’t seen i...
December 22, 2021

Owl’s Hardware-Enforced Security Provides Reliable Protection Against Log4j Vulnerabilities

Like thousands of other organizations, Owl Cyber Defense began reviewing the potential impact of the Log4j remote code execution vulnerability as soon as the vulnerability was announced. ...
December 17, 2021

Cybersecurity Secrets, Courtesy of the Russian FSB

Effective cybersecurity depends on understanding the threat: who is attacking a system, what tactics and techniques they are using, and what they hope to accomplish. Security professional...
December 9, 2021
Dennis Lanahan VP, Critical Infrastructure

Cybersecurity for Renewable Power Generation

The power industry is no stranger to cybersecurity. Given its essential role in every aspect of daily life, the industry follows strict guidelines for securing networks and devices that c...
November 23, 2021
Prev
1 2 3 5
Next