Blog Industry: DoD/Intel
Scott Coleman Vice President, Marketing
How can we harden networks without hardware?
Hoping to head off cyber threats that aren’t constrained by geographical or national boundaries, President Biden issued a statement urging the continued hardening of domestic cybersecur...
After Two Years, DoDIIS Returns to an Environment of Changing Priorities
The Department of Defense Intelligence Information Systems (DoDIIS) conference took place in mid-December in Phoenix, AZ. It was great to reconvene with many colleagues we hadn’t seen i...
Cybersecurity Secrets, Courtesy of the Russian FSB
Effective cybersecurity depends on understanding the threat: who is attacking a system, what tactics and techniques they are using, and what they hope to accomplish. Security professional...
Elevating the Federal Cybersecurity Discussion
We were thrilled to co-sponsor a compelling event–in person and virtually–with FCW that showcased senior-level cyber leaders from federal defense, civilian and intelligence agencies. ...
Cross Domain Solution Assessment & Authorization: Part 2 – Acronyms, Assessments, and Everything in Between
In our previous post, we discussed the purpose and goals of Assessment & Authorization (A&A) processes for various technologies, specifically with regard to U.S. Government testin...
Cross Domain Solution FAQ
Cross domain solutions have protected the world's most sensitive networks and data for more than 20 years. Despite the technology's widespread use within governmental, military, and intel...
Cross Domain Solution Assessment & Authorization: Part 1 – What is A&A?
Cross domain solutions (CDS) are network security devices which are designed to control and filter content (data) transferred between the most sensitive and classified networks within the...
Dave Britton Vice President, Assured Collaboration Systems
Secure, Scalable VoIP for Joint and Coalition Operations
Voice over IP (VoIP) communication has become an essential tool for the US military and intelligence community, but when information needs to flow across network boundaries, keeping the l...
Dave Britton Vice President, Assured Collaboration Systems
Building the Future of Cross Domain Security
In early January, Owl Cyber Defense announced the acquisition of the Assured Collaboration Systems (ACS) product line from Trident Systems Incorporated. This acquisition brings together t...
It’s Not Personal, It’s a Cyber Attack
Security breaches happen so often, it can be difficult to find something new to say about them. That’s why we don’t go out of our way to comment on every incident that makes it into t...
Cross Domain Solutions vs Firewalls
Transferring data securely between networks or systems with different security requirements is one of the fundamental challenges of cybersecurity. For a typical organization, the solution...
Solving the Data Format Problem with Daffodil
It goes without saying that to be useful anywhere, data has to be in some sort of format. But every time you start using a new data format, you have to tell your software how to use it, a...