Blog Industry: Pharma Manufacturing
Amalia Rosen
Trusted Data Under Fire: What Our Audience Taught Us About Securing the Tactical Edge
In modern defense operations, trusted data is no longer a nice‑to‑have; it is the backbone of decision advantage at every echelon, from headquarters to the tactical edge. As missions ...
Kristina Dettwiler Product Marketing
7 Mission Bottlenecks You Can Eliminate Now with Protocol Filtering Diodes
Security should clear bottlenecks—not create them. Yet for many missions, legacy tools have become chokepoints that stall data and force teams into risky workarounds just to keep up wit...
Kristina Dettwiler Product Marketing
Just Released: Owl Talon v3.4.0.0 Raises the Bar Again for One-Way Security
As attack tactics escalate, your defenses must raise the bar on security, adaptability, and flexibility—and Owl data diodes are purpose-built to help you do exactly that. With O...
Scott Orton CEO, Owl Cyber Defense
The National Cyber Strategy: “Nuclear-Grade” is the Way Forward
Late March 6, 2026, the White House released a new National Cybersecurity Strategy. While the strategy outlines a broad and ambitious roadmap for our digital future, the real challenge...
Steve Stratton Author | Retired Green Beret | Cybersecurity Advisor
Operation Skipjack – Part 1
Chapter One
INDOPACOM J3 Admiral Nikki Fury
Camp H. M. Smith Aiea, Hawaii
As I’m walking back to my office in the J3-Operations Directorate, I have a feeling something is not rig...
John McKeon Business Development Manager - Financial Services
How Can SIEM Work with Air-Gapped Networks?
To keep a critical network safe, a common practice has traditionally been to establish an air gap – in other words, disconnect that network from “untrusted” or less secure networks,...
Brian Romansky Chief Innovation Officer
Vaccine-like Trials Could Allay Software Patch Concerns
A recent article from fortune.com implies that perhaps the Russian race to be the first to announce an approved vaccine for COVID-19 might circumvent the level of rigorous safety and effi...
Bill Caffery Strategic Technology Advisor
Closing the Barn Door?
According to yesterday’s NY Times (July 16, 2020) U.S. Intelligence agencies have revealed that a small but well-known hacking group associated with Russian Intelligence have been “ta...
Charlie Schick Healthcare Consultant
Protecting Information Amongst the Chaos
This week, new evidence emerged that a group linked to the Russian government, APT29 (also known as Cozy Bear), has been attacking and trying to steal COVID-19-related informati...
Charlie Schick Healthcare Consultant
VxWorks URGENT/11 – When Your Reliable System is Actually a Time Bomb
What You Need to Know
Eleven critical vulnerabilities were found in a leading real-time operating system (RTOS) used in many industries, by leading vendors - VxWorks. The nature and scal...
Charlie Schick Pharma and Healthcare Consultant
Total Geekery: Data Diode Bioreactor Demo
This post will be on the light side, describing a demo I had fun making and about which my co-workers are tired of hearing me speak. Nonetheless, despite the geekiness of the demo, it was...
Charlie Schick Healthcare Consultant
How Will You Securely Expand Your PI System to Include Contract Manufacturers?
So you want to optimize your manufacturing operations. The competitive landscape virtually demands it, driving efficiency into every facet of every process across your organization and be...