Category: Uncategorized

Scott Orton CEO, Owl Cyber Defense

The National Cyber Strategy: “Nuclear-Grade” is the Way Forward

Late March 6, 2026, the White House released a new National Cybersecurity Strategy. While the strategy outlines a broad and ambitious roadmap for our digital future, the real challenge...
March 13, 2026
Kristina Dettwiler Product Marketing

Is ‘One‑Way’ Enough? Why Critical Ops Should Shift to Protocol Filtering Diodes

For years, “data diode” has meant one thing: a one‑way link you can trust. Data flows out, nothing comes back in. That simple guarantee underpinned one‑way security and audit‑re...
March 3, 2026
Kristina Dettwiler Product Marketing

From Concept to Deployment: A Cross‑Domain Playbook with XD Bridge ST and XD Guardian XML 

Most programs already know they need cross domain data sharing; the real struggle is turning that requirement into something authorized, sustainable, and partner‑ready.   The fir...
February 12, 2026
Kristina Dettwiler Product Marketing

XD Bridge ST in the Real World: Architectures That Deliver Decision Advantage

We know from our last post that decision advantage is not just about collecting data—it is about getting the right data to the right place, at the right time, without breaking t...
January 20, 2026
Kristina Dettwiler Product Marketing

5 Ways XD Bridge ST Turns Zero‑Trust Demands into Cross Domain Mission Wins

For cannot-fail missions, decision advantage depends less on how much data you collect and more on how securely and quickly you can act on trusted information. Yet today’s missions ...
January 12, 2026
Carolyn Ford VP, Marketing

Parsing the Future: Mike Beckerle’s Legacy and the Power of Daffodil

In the world of secure data sharing, the hardest part isn’t building the walls, it’s translating across them.  As legacy systems, proprietary protocols, and outdated formats pile ...
December 19, 2025
Daniel Bartucci Cyber Security Strategist - Critical Infrastructure

Applying Zero Trust in Industrial Control Systems: Where It Works and Where It Breaks

Zero Trust is now the dominant paradigm in enterprise cybersecurity, but its practical application in Industrial Control Systems (ICS) presents unique challenges and opportunities. In cri...
October 21, 2025

Secure Data Sharing Over High Threat Networks

U.S. military and intelligence missions and organizations are increasingly collecting and sharing information over the internet and other networks with varying (or unknown) levels of secu...
April 2, 2025

Reduce Cyber Stress (at least at work) by Implementing Data Diode Enforced Segmentation

In today's digital age, cybersecurity professionals play a crucial role in ensuring the safety and security of an organization's sensitive information. With the rise of cyberattacks, it's...
April 20, 2023

Owl Spotlight : Richard Alther

The Owl Cyber Defense Employee Spotlight is our way of highlighting some of the incredibly talented individuals that we’re lucky enough to have on our team. At Owl, we recognize our peo...
May 27, 2022

Owl Spotlight : Nathan Gorka

The Owl Cyber Defense Employee Spotlight is our way of highlighting some of the incredibly talented individuals that we’re lucky enough to have on our team. At Owl, we recognize our peo...
May 18, 2022

After Two Years, DoDIIS Returns to an Environment of Changing Priorities

The Department of Defense Intelligence Information Systems (DoDIIS) conference took place in mid-December in Phoenix, AZ. It was great to reconvene with many colleagues we hadn’t seen i...
December 22, 2021
Prev
1 2 3 6
Next