Category: Blog
Paul Nguyen DoD Account Director
Proven Solutions for Navy “Data Maneuverability” @ AFCEA WEST
Hi, I’m Paul Nguyen, one of the new leaders of Owl’s DoD Mission Support team. I joined Owl Cyber Defense (Owl) earlier this month, just in time to be a part of our annual corporate o...
Owl SEER Lab MiniBlog 1: CVE-2023-21093
Hello and welcome to the launch of the Owl Cyber Defense System Evaluation, Exploitation, and Research (SEER) Laboratory miniblog!
This is the very first in a line of forthcoming posts. ...
Scott Coleman Vice President, Marketing
How can we harden networks without hardware?
Hoping to head off cyber threats that aren’t constrained by geographical or national boundaries, President Biden issued a statement urging the continued hardening of domestic cybersecur...
Defending Against the Unknown: Hardware-Enforced Security and Zero-Day Vulnerabilities
Until something even worse comes along, the Log4j remote code execution vulnerability will be the biggest story (and biggest headache) in cybersecurity. But even as security teams around ...
Owl’s Hardware-Enforced Security Provides Reliable Protection Against Log4j Vulnerabilities
Like thousands of other organizations, Owl Cyber Defense began reviewing the potential impact of the Log4j remote code execution vulnerability as soon as the vulnerability was announced. ...
Cross Domain Solution Assessment & Authorization: Part 2 – Acronyms, Assessments, and Everything in Between
In our previous post, we discussed the purpose and goals of Assessment & Authorization (A&A) processes for various technologies, specifically with regard to U.S. Government testin...
Air-Gapped Networks and Data Diodes
An air gap is the ultimate cybersecurity measure: a physical separation between a secure network and any other computer or network.
The purpose of an air gap is to eliminate any poss...
Dan Crum
Common Criteria Evaluation Assurance Level and Data Diodes
As the world’s #1 provider of data diode technology, we field a lot of questions about Common Criteria (CC) and its “Evaluation Assurance Levels” (EAL) of certification, from EAL1 t...
Cross Domain Solution FAQ
Cross domain solutions have protected the world's most sensitive networks and data for more than 20 years. Despite the technology's widespread use within governmental, military, and intel...
Cross Domain Solution Assessment & Authorization: Part 1 – What is A&A?
Cross domain solutions (CDS) are network security devices which are designed to control and filter content (data) transferred between the most sensitive and classified networks within the...
Scott Coleman Vice President of Marketing
7 Myths About Data Diodes
Not sure what you should believe about data diodes?
It’s no surprise—manufacturers of “unidirectional gateways” and other inferior technologies have done their best to create c...
Brian Romansky Chief Innovation Officer
Embedded Cybersecurity: A Paradigm Shift in Critical Infrastructure
The Shift from Stand-Alone To Embedded Cybersecurity
Industry 4.0, the ongoing move toward interconnectivity and automation in industrial process control, has opened a world of new po...