Owl Evolution Summit - Operation: Decision Advantage...Reserve Your Seat Today! Register Here.
Government
Government
Solutions
Products US Cross Domain Solutions International Solution Data Diodes Secure Collaboration Tools Removable Media Security
Use Cases High Threat Network Connectivity Zero Trust AI U.S. DoW & IC
Services Support Training Solutions Engineering
Learn
About Data Diodes About Cross Domain Solutions Resource Library Video Resource Library Owl GitHub
Contact Us
Tech Support Request a Quote
Commercial
Commercial
Solutions
Products Cross Domain Solutions Data Diodes
Use Cases Oil & Gas Power Cyber Recovery Vault
Services Support Training Solutions Engineering
Learn
About Data Diodes About Cross Domain Solutions Resource Library Video Resource Library Owl GitHub
Contact Us
Tech Support Request a Quote
Company
Company
who we are
About Owl Our Process Blog News Webinars Events Careers
Partners
Become a Partner Find a Distributor Dell Technologies
Unpacking Cross-Domain Technology: The Mechanics of Security and Efficiency
Artificial Intelligence (AI) is transforming national security, defense, and critical industries.
Read More
Tech Support Request a Quote
Logo
Tech Support Request a Quote
Logo
goverment
Hit Enter to Search or ESC to close
Uncategorized Page 4

Category: Uncategorized

Charlie Schick Healthcare Consultant

A New Model for Secure IIoT Connectivity

I recently wrote a post about how IIoT devices are upending the Purdue Model as folks jump layers and stream data from the low layers directly up to the higher layers and beyond. Thinkin...
September 23, 2019
Gary McGibbon Business Development Manager - Financial Services

Integrating Digital Transformation and Cybersecurity Transformation in Financial Services

Financial services institutions are now wading through the latest wave of operational changes that focus on customer centricity and streamlined core operations – digital transformation ...
September 20, 2019
Shawn Campbell Product Manager - Government Solutions

A Brief Note on Raise the Bar and One-Way Transfer

This past year’s publication of the National Cross Domain Strategy and Management Office (NCDSMO) “Raise the Bar” (RTB) mandate is causing a positive transformation of the cross dom...
September 18, 2019
Charlie Schick Healthcare Consultant

How IIoT and the Cloud are Upending the Purdue Model in Manufacturing

The Purdue Model of Control Hierarchy is a framework commonly used by manufacturers in pharmaceuticals, oil and gas, food and beverage, and other verticals to group enterprise and industr...
September 11, 2019
Gary McGibbon Business Development Manager - Financial Services

Capital One as a Canary in the Cloud Coal Mine: Part 3 – Conclusions

If the Capital One sysadmin had just changed the WAF password... In the final part of our blog series on the Capital One breach, I want to discuss the conclusions reached based on the vu...
August 15, 2019
Gary McGibbon Business Development Manager - Financial Services

Capital One as a Canary in the Cloud Coal Mine: Part 2 – Findings

"That is a pretty egregious oversight." In the second part of our three part series on the Capital One breach, I want to discuss the vulnerabilities and other elements that went into the...
August 13, 2019
Gary McGibbon Business Development Manager - Financial Services

Capital One as a Canary in the Cloud Coal Mine: Part 1 – What Happened?

Was Capital One an aberration? Recently released data from the 2019 IBM/Ponemon Cost of a Data Breach Report identifies financial services institutions as one of the top two industry gro...
August 9, 2019
Charlie Schick Healthcare Consultant

Running Away is Not a Good Cyber Strategy for Ransomware

There’s one common characteristic of folks who are in the cybersecurity world: we have an (admittedly dark) fascination with reading about hacks in the news. The intellectuals will try ...
July 11, 2019
Phil Won Product Manager

Addressing the Cybersecurity Skills Shortage

Even more difficult than getting approval for an added headcount to address your cybersecurity concerns is finding the right person to fill that hard-fought opening. There are two factors...
July 9, 2019
John McKeon Business Development Manager - Financial Services

Secure Processing Enclaves for Crypto Asset Exchanges and Custodians

Cryptocurrency exchanges and custodians are an emerging and rapidly expanding market (>25%), with growth far exceeding that of the traditional capital markets sector. A relatively new ...
June 27, 2019
Dan Callahan Civilian Intelligence Account Executive

What’s Changing in Cybersecurity & Why it’s Important

Technology manufacturers in the global IT market occasionally come up for air in order to revalidate that our value propositions are still germane. Essentially, we like to know that we’...
June 25, 2019
Andrew Nix Commercial Sales Consultant

Securing BSEE Real-Time Monitoring for Offshore Oil & Gas Operations

In the wake of the Deepwater Horizon disaster in 2010, the U.S. Department of the Interior launched a series of aggressive reforms in improve safety in offshore well operations. Among the...
April 29, 2019
Prev
1 2 3 4 5
Next

Insights to your Inbox

Stay informed with the latest cybersecurity news and resources.

  • This field is for validation purposes and should be left unchanged.

Request Information

We pride ourselves on being experts in data diode cybersecurity. Reach out and a member of our team will share more insight with you.

Request Info
Logo
8840 Stanford Blvd., Suite 2100
Columbia, MD 21045

Government

  • US Cross Domain Solutions
  • International Solutions
  • Data Diodes
  • Secure Collaboration Tools 
  • Removable Media Security

Use Cases

  • Defense
  • Intelligence Communities
  • Civilian Government

Services

  • Support
  • Training
  • Solutions Engineering

Commercial

  • Cross Domain Solutions
  • Data Diodes

Use Cases

  • Critical Infrastructure
  • Dell

Services

  • Support
  • Training
  • Solutions Engineering

Learn

Government

  • About Data Diodes
  • About Cross Domain Solutions
  • Resource Library
  • Video Resource Library

Commercial

  • About Data Diodes
  • About Cross Domain Solutions
  • Resource Library
  • Video Resource Library

Company

  • About Owl
  • Our Process
  • Blog
  • News
  • Webinars
  • Events
  • Careers
  • OPDS Solutions Suite

Partners

  • Become a Partner
  • Find a Distributor
  • Dell Technologies
©2025 Owl Cyber Defense
  • Terms of Use & Privacy Policy
  • Terms of Sale
  • Purchase Terms & Conditions
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies. However you may visit Cookie Settings to provide a controlled consent.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
Save & Accept
Request a Quote