Category: Uncategorized
Carolyn Ford VP, Marketing
Parsing the Future: Mike Beckerle’s Legacy and the Power of Daffodil
In the world of secure data sharing, the hardest part isn’t building the walls, it’s translating across them.
As legacy systems, proprietary protocols, and outdated formats pile ...
Daniel Bartucci Cyber Security Strategist - Critical Infrastructure
Applying Zero Trust in Industrial Control Systems: Where It Works and Where It Breaks
Zero Trust is now the dominant paradigm in enterprise cybersecurity, but its practical application in Industrial Control Systems (ICS) presents unique challenges and opportunities. In cri...
Secure Data Sharing Over High Threat Networks
U.S. military and intelligence missions and organizations are increasingly collecting and sharing information over the internet and other networks with varying (or unknown) levels of secu...
Reduce Cyber Stress (at least at work) by Implementing Data Diode Enforced Segmentation
In today's digital age, cybersecurity professionals play a crucial role in ensuring the safety and security of an organization's sensitive information. With the rise of cyberattacks, it's...
Owl Spotlight : Richard Alther
The Owl Cyber Defense Employee Spotlight is our way of highlighting some of the incredibly talented individuals that we’re lucky enough to have on our team. At Owl, we recognize our peo...
Owl Spotlight : Nathan Gorka
The Owl Cyber Defense Employee Spotlight is our way of highlighting some of the incredibly talented individuals that we’re lucky enough to have on our team. At Owl, we recognize our peo...
After Two Years, DoDIIS Returns to an Environment of Changing Priorities
The Department of Defense Intelligence Information Systems (DoDIIS) conference took place in mid-December in Phoenix, AZ. It was great to reconvene with many colleagues we hadn’t seen i...
Tom Goodman and Jay Abdallah
Cybersecurity Was a *Hot* Topic at the Dubai Airshow
November saw the return of the Dubai Airshow, one of the biggest and most important events in the aviation industry. With an estimated 120,000 attendees, there was a true level of excitem...
Cybersecurity Secrets, Courtesy of the Russian FSB
Effective cybersecurity depends on understanding the threat: who is attacking a system, what tactics and techniques they are using, and what they hope to accomplish. Security professional...
Dennis Lanahan VP, Critical Infrastructure
Cybersecurity for Renewable Power Generation
The power industry is no stranger to cybersecurity. Given its essential role in every aspect of daily life, the industry follows strict guidelines for securing networks and devices that c...
Elevating the Federal Cybersecurity Discussion
We were thrilled to co-sponsor a compelling event–in person and virtually–with FCW that showcased senior-level cyber leaders from federal defense, civilian and intelligence agencies. ...
Best Practices for OT-to-Cloud Connectivity
Cloud connectivity offers a wealth of benefits for energy providers and other critical infrastructure operators. Sending data from operational technology devices to the cloud allows asset...