The Doc Ock Problem: Securing AI Command from the Edge Inward
April 27, 2026 10:00 amIn the 20th century arms race was measured by missile tests and stockpiles of weapons. AI is shifting the 21st... View Article
In the 20th century arms race was measured by missile tests and stockpiles of weapons. AI is shifting the 21st... View Article
In modern defense operations, trusted data is no longer a nice‑to‑have; it is the backbone of decision advantage at every... View Article
Security should clear bottlenecks—not create them. Yet for many missions, legacy tools have become chokepoints that stall data and force... View Article
U.S. military and intelligence missions and organizations are increasingly collecting and sharing information over the internet and other networks with... View Article
Until something even worse comes along, the Log4j remote code execution vulnerability will be the biggest story (and biggest headache)... View Article
The Department of Defense Intelligence Information Systems (DoDIIS) conference took place in mid-December in Phoenix, AZ. It was great to... View Article
Like thousands of other organizations, Owl Cyber Defense began reviewing the potential impact of the Log4j remote code execution vulnerability... View Article
Effective cybersecurity depends on understanding the threat: who is attacking a system, what tactics and techniques they are using, and... View Article
The power industry is no stranger to cybersecurity. Given its essential role in every aspect of daily life, the industry... View Article
We were thrilled to co-sponsor a compelling event–in person and virtually–with FCW that showcased senior-level cyber leaders from federal defense,... View Article
Cloud connectivity offers a wealth of benefits for energy providers and other critical infrastructure operators. Sending data from operational technology... View Article
No one wants to repeat the week-long Colonial Pipeline shutdown, or—even worse—see a critical infrastructure cyber attack that manages to... View Article
We pride ourselves on being experts in data diode cybersecurity. Reach out and a member of our team will share more insight with you.
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |