Category: Uncategorized
Sharada Prahladrao ARC Advisory Group
ARC Advisory Group – Owl Cyber Defense Workshop on Sustainable OT Cybersecurity Strategy
Cybersecurity is now at the forefront of all deliberations in a digitally connected world. Once again an entire day at the ARC Industry Forum in Orlando featured cybersecurity worksho...
Aileen Casmano Marketing Communications Manager
Staying Cyber-Aware While Social Distancing
Due to the COVID-19 (AKA "Coronavirus") pandemic, many organizations are implementing telework or work-from-home policies to maintain business continuity while “flattening the curve” ...
John McKeon Business Development Manager - Financial Services
Comments on the Upcoming NIST Special Publication 1800-25A
As you may or may not be aware, the National Cybersecurity Center of Excellence (NCCoE) at NIST has released a draft version of NIST Cybersecurity Practice Guide SP 1800-25 - Identifying ...
Dan Crum Marketing Manager
Introducing SELint – A Free SELinux Policy Analysis Tool
As part of our ongoing leadership in the SELinux community, Tresys – now Owl Cyber Defense, as the companies have recently merged – has developed SELint, a free tool designed to perfo...
Charlie Schick Healthcare Consultant
Windows 7 End of Life Puts Hospitals in a Pickle
Microsoft is ending all support for Windows 7 on January 14th, 2020 - less than 3 months away (as of this writing)! After that time, there will no longer be any updates (including securit...
Charlie Schick Pharma and Healthcare Consultant
Total Geekery: Data Diode Bioreactor Demo
This post will be on the light side, describing a demo I had fun making and about which my co-workers are tired of hearing me speak. Nonetheless, despite the geekiness of the demo, it was...
Charlie Schick Healthcare Consultant
How Will You Securely Expand Your PI System to Include Contract Manufacturers?
So you want to optimize your manufacturing operations. The competitive landscape virtually demands it, driving efficiency into every facet of every process across your organization and be...
Charlie Schick Healthcare Consultant
A New Model for Secure IIoT Connectivity
I recently wrote a post about how IIoT devices are upending the Purdue Model as folks jump layers and stream data from the low layers directly up to the higher layers and beyond. Thinkin...
Gary McGibbon Business Development Manager - Financial Services
Integrating Digital Transformation and Cybersecurity Transformation in Financial Services
Financial services institutions are now wading through the latest wave of operational changes that focus on customer centricity and streamlined core operations – digital transformation ...
Shawn Campbell Product Manager - Government Solutions
A Brief Note on Raise the Bar and One-Way Transfer
This past year’s publication of the National Cross Domain Strategy and Management Office (NCDSMO) “Raise the Bar” (RTB) mandate is causing a positive transformation of the cross dom...
Charlie Schick Healthcare Consultant
How IIoT and the Cloud are Upending the Purdue Model in Manufacturing
The Purdue Model of Control Hierarchy is a framework commonly used by manufacturers in pharmaceuticals, oil and gas, food and beverage, and other verticals to group enterprise and industr...
Gary McGibbon Business Development Manager - Financial Services
Capital One as a Canary in the Cloud Coal Mine: Part 3 – Conclusions
If the Capital One sysadmin had just changed the WAF password...
In the final part of our blog series on the Capital One breach, I want to discuss the conclusions reached based on the vu...