Category: Uncategorized

Webinar: The Critical Value of Hardware-Based Security
In critical infrastructure, there’s no room for inherently vulnerable cybersecurity solutions. The hacker community has spent decades developing ways to exploit commercial software ecos...

Cross Domain Security for Critical Infrastructure
Cybersecurity has always been a key concern in the critical infrastructure sector. But in 2021, security is taking on even greater importance, due to the convergence of two factors: the g...

Brian Romansky Chief Innovation Officer
A New Paradigm: OT Security and Data in the Cloud
Many industries have seen significant improvements in operational efficiency and reduced downtime by adopting advanced analytics and optimization algorithms that run on cloud services.
...

The Oldsmar Water System Attack: What It Can Teach Us
Last week’s attack on the Oldsmar, Florida, water system demonstrated that critical infrastructure operations are under constant threat of cyber attacks, and that a successful attack ca...

Brian Romansky Chief Innovation Officer
Hardware-Based Filtering: FPGA Security In Action
The vulnerabilities inherent in software-based cybersecurity solutions cause greater concern every year. Due to the fact that any software-based solution relies on a central processing un...

Gary McGibbon Business Development Manager - Financial Services
Capital One as a Canary in the Cloud Coal Mine: Part 3 – Conclusions
If the Capital One sysadmin had just changed the WAF password...
In the final part of our blog series on the Capital One breach, I want to discuss the conclusions reached based on the vu...

Dave Britton Vice President, Assured Collaboration Systems
Secure, Scalable VoIP for Joint and Coalition Operations
Voice over IP (VoIP) communication has become an essential tool for the US military and intelligence community, but when information needs to flow across network boundaries, keeping the l...

Dave Britton Vice President, Assured Collaboration Systems
Building the Future of Cross Domain Security
In early January, Owl Cyber Defense announced the acquisition of the Assured Collaboration Systems (ACS) product line from Trident Systems Incorporated. This acquisition brings together t...

It’s Not Personal, It’s a Cyber Attack
Security breaches happen so often, it can be difficult to find something new to say about them. That’s why we don’t go out of our way to comment on every incident that makes it into t...

Ken Walker Chief Technology Officer
Amnesia:33 and Ripple20 Highlight the Difference Between Hardware-Enforced CDS and Firewalls
For years, the NSA has been telling us that firewalls are worthless as defense against targeted nation-state attacks. Now we finally have some examples of why this is true.
On December...

Brian Romansky Chief Innovation Officer
Minimizing Risk with FPGAs and Hardware-Based Security
Conventional data security technology has entered a mode of persistent escalation. System designers invest heavily in design and validation, while attackers continually uncover, exploit, ...

Solving the Data Format Problem with Daffodil
It goes without saying that to be useful anywhere, data has to be in some sort of format. But every time you start using a new data format, you have to tell your software how to use it, a...