Industry: Financial Services
Kristina Dettwiler Product Marketing
3 Questions to Ask Before Connecting a “Dirty” Endpoint to Your Analysis Environment
When a breach hits, the pressure is immediate. Incident response and forensics teams need to pull evidence from suspect machines fast – sometimes while systems are still live, advers...
Michael Blake Technical Fellow Owl Cyber Defense
The Doc Ock Problem: Securing AI Command from the Edge Inward
In the 20th century arms race was measured by missile tests and stockpiles of weapons. AI is shifting the 21st century global competition from a mode of kinetic stockpiling to a weaponi...
Amalia Rosen
Trusted Data Under Fire: What Our Audience Taught Us About Securing the Tactical Edge
In modern defense operations, trusted data is no longer a nice‑to‑have; it is the backbone of decision advantage at every echelon, from headquarters to the tactical edge. As missions ...
Kristina Dettwiler Product Marketing
7 Mission Bottlenecks You Can Eliminate Now with Protocol Filtering Diodes
Security should clear bottlenecks—not create them. Yet for many missions, legacy tools have become chokepoints that stall data and force teams into risky workarounds just to keep up wit...
Kristina Dettwiler Product Marketing
Just Released: Owl Talon v3.4.0.0 Raises the Bar Again for One-Way Security
As attack tactics escalate, your defenses must raise the bar on security, adaptability, and flexibility—and Owl data diodes are purpose-built to help you do exactly that. With O...
Scott Orton CEO, Owl Cyber Defense
The National Cyber Strategy: “Nuclear-Grade” is the Way Forward
Late March 6, 2026, the White House released a new National Cybersecurity Strategy. While the strategy outlines a broad and ambitious roadmap for our digital future, the real challenge...
Zero Trust ≠ Zero Risk: Debunking the Myths and Building Real Resilience
In this episode of Tech Transforms, Carolyn Ford sits down with Michael Blake of Owl Cyber Defense and Chris Rule of GME to unpack one of cybersecurity’s most misunderstood concepts: Ze...
One Woman’s Rebellion Against Reckless AI
One Woman’s Rebellion Against Reckless AI
In this thought-provoking episode of Tech Transforms, host Carolyn Ford welcomes Janet Kang, a Silicon Valley entrepreneur turned nonprofit le...
Stealth Mode: Unmasking Cyber Threats Hiding in Plain Sight
In this episode of Tech Transforms, host Carolyn Ford welcomes Connor Morley, Head of Security Research at Glasswall, for a deep dive into the spy-thriller world of modern file security.
...
Brewing AI: Tricks, Treats & Tech Myths (Chills & Thrills Finale)
For our Halloween finale, Carolyn Ford invites two favorite “AI conjurers”, Dave Egts “Mr. X,” public-sector field CTO at Mulesoft, and Laura Klebanow, founder & chief storyte...
