Owl Blog
Thoughts and Insights from the Cybersecurity Industry
It’s Not Personal, It’s a Cyber Attack
Security breaches happen so often, it can be difficult to find something new to say about them. That’s why we don’t go out of our way to comment on every incident that makes it into t...
Ken Walker Chief Technology Officer
Amnesia:33 and Ripple20 Highlight the Difference Between Hardware-Enforced CDS and Firewalls
For years, the NSA has been telling us that firewalls are worthless as defense against targeted nation-state attacks. Now we finally have some examples of why this is true.
On December...
Brian Romansky Chief Innovation Officer
Minimizing Risk with FPGAs and Hardware-Based Security
Conventional data security technology has entered a mode of persistent escalation. System designers invest heavily in design and validation, while attackers continually uncover, exploit, ...
Brian Romansky Chief Innovation Officer
Why Embed? The Value of Native Security in Industrial Controls
In recent years, threat actors have developed highly sophisticated tools to attack industrial control systems. Some attacks aim to steal data or infect user workstations, while other, mor...