
Secure Data Sharing Over High Threat Networks
April 2, 2025 2:32 pmU.S. military and intelligence missions and organizations are increasingly collecting and sharing information over the internet and other networks with... View Article
U.S. military and intelligence missions and organizations are increasingly collecting and sharing information over the internet and other networks with... View Article
Not sure what you should believe about data diodes? It’s no surprise—manufacturers of “unidirectional gateways” and other inferior technologies have... View Article
An air gap is the ultimate cybersecurity measure: a physical separation between a secure network and any other computer or... View Article
The Shift from Stand-Alone To Embedded Cybersecurity Industry 4.0, the ongoing move toward interconnectivity and automation in industrial process control, has opened a... View Article
Until something even worse comes along, the Log4j remote code execution vulnerability will be the biggest story (and biggest headache)... View Article
Like thousands of other organizations, Owl Cyber Defense began reviewing the potential impact of the Log4j remote code execution vulnerability... View Article
The Department of Defense Intelligence Information Systems (DoDIIS) conference took place in mid-December in Phoenix, AZ. It was great to... View Article
Effective cybersecurity depends on understanding the threat: who is attacking a system, what tactics and techniques they are using, and... View Article
The power industry is no stranger to cybersecurity. Given its essential role in every aspect of daily life, the industry... View Article
We were thrilled to co-sponsor a compelling event–in person and virtually–with FCW that showcased senior-level cyber leaders from federal defense,... View Article
Cloud connectivity offers a wealth of benefits for energy providers and other critical infrastructure operators. Sending data from operational technology... View Article
No one wants to repeat the week-long Colonial Pipeline shutdown, or—even worse—see a critical infrastructure cyber attack that manages to... View Article
We pride ourselves on being experts in data diode cybersecurity. Reach out and a member of our team will share more insight with you.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |