Blog Industry: DoD/Intel

Celebrating Federal 100 Award Winners in Cross Domain Cybersecurity: Deidre L. Jackson
Securing Real-Time Collaboration:
Cross-domain solutions are the backbone of national security in mission-critical environments, where intelligence must move securely across domains, an...

Dan Crum
Building Resilience at the Tactical Edge—Lessons for the Season
As the year winds down, it’s a natural time to reflect on the principles that enable success during moments of complexity and uncertainty. At Owl Cyber Defense, we are reminded of how f...

Daniel Crum Director, Product Marketing
AI’s Role in Defense – Accelerating Decision Dominance in the Next Era of Warfare
"AI is not just another technology. It is a transformative technology that will change the way we fight and defend our nation."
Kathleen Hicks, Deputy Secretary of Defense
Techn...

Daniel Crum Director, Product Marketing
Hidden Threats in AI Data: Protecting Against Embedded Steganography
As the 2023 Executive Order on Artificial Intelligence (AI) specifically lays out, "Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks." On...

Daniel Crum Director, Product Marketing
The Importance of Network Segmentation in Achieving Zero Trust
In today’s rapidly evolving cybersecurity landscape, government agencies face relentless pressure to protect sensitive information from increasingly sophisticated threats. Gone are the ...

Owl & AFRL – Pioneering Secure Cross Domain Video Transfer
A drone hovers over a remote compound in a hostile region, capturing live video of a high-value target—a terrorist leader whose capture could dismantle a global threat network. The stak...

Paul Nguyen DoD Account Director
Proven Solutions for Navy “Data Maneuverability” @ AFCEA WEST
Hi, I’m Paul Nguyen, one of the new leaders of Owl’s DoD Mission Support team. I joined Owl Cyber Defense (Owl) earlier this month, just in time to be a part of our annual corporate o...

Scott Coleman Vice President, Marketing
How can we harden networks without hardware?
Hoping to head off cyber threats that aren’t constrained by geographical or national boundaries, President Biden issued a statement urging the continued hardening of domestic cybersecur...

After Two Years, DoDIIS Returns to an Environment of Changing Priorities
The Department of Defense Intelligence Information Systems (DoDIIS) conference took place in mid-December in Phoenix, AZ. It was great to reconvene with many colleagues we hadn’t seen i...

Cybersecurity Secrets, Courtesy of the Russian FSB
Effective cybersecurity depends on understanding the threat: who is attacking a system, what tactics and techniques they are using, and what they hope to accomplish. Security professional...

Elevating the Federal Cybersecurity Discussion
We were thrilled to co-sponsor a compelling event–in person and virtually–with FCW that showcased senior-level cyber leaders from federal defense, civilian and intelligence agencies. ...

Cross Domain Solution Assessment & Authorization: Part 2 – Acronyms, Assessments, and Everything in Between
In our previous post, we discussed the purpose and goals of Assessment & Authorization (A&A) processes for various technologies, specifically with regard to U.S. Government testin...