Owl Blog
Thoughts and Insights from the Cybersecurity Industry
Charlie Schick Healthcare Consultant
How Will You Securely Expand Your PI System to Include Contract Manufacturers?
So you want to optimize your manufacturing operations. The competitive landscape virtually demands it, driving efficiency into every facet of every process across your organization and be...
Charlie Schick Healthcare Consultant
A New Model for Secure IIoT Connectivity
I recently wrote a post about how IIoT devices are upending the Purdue Model as folks jump layers and stream data from the low layers directly up to the higher layers and beyond. Thinkin...
Gary McGibbon Business Development Manager - Financial Services
Integrating Digital Transformation and Cybersecurity Transformation in Financial Services
Financial services institutions are now wading through the latest wave of operational changes that focus on customer centricity and streamlined core operations – digital transformation ...
Shawn Campbell Product Manager - Government Solutions
A Brief Note on Raise the Bar and One-Way Transfer
This past year’s publication of the National Cross Domain Strategy and Management Office (NCDSMO) “Raise the Bar” (RTB) mandate is causing a positive transformation of the cross dom...