Blog Industry: DoD/Intel
Daniel Crum Director, Product Marketing
The Importance of Network Segmentation in Achieving Zero Trust
In today’s rapidly evolving cybersecurity landscape, government agencies face relentless pressure to protect sensitive information from increasingly sophisticated threats. Gone are the ...
Owl & AFRL – Pioneering Secure Cross Domain Video Transfer
A drone hovers over a remote compound in a hostile region, capturing live video of a high-value target—a terrorist leader whose capture could dismantle a global threat network. The stak...
Paul Nguyen DoD Account Director
Proven Solutions for Navy “Data Maneuverability” @ AFCEA WEST
Hi, I’m Paul Nguyen, one of the new leaders of Owl’s DoD Mission Support team. I joined Owl Cyber Defense (Owl) earlier this month, just in time to be a part of our annual corporate o...
Scott Coleman Vice President, Marketing
How can we harden networks without hardware?
Hoping to head off cyber threats that aren’t constrained by geographical or national boundaries, President Biden issued a statement urging the continued hardening of domestic cybersecur...
After Two Years, DoDIIS Returns to an Environment of Changing Priorities
The Department of Defense Intelligence Information Systems (DoDIIS) conference took place in mid-December in Phoenix, AZ. It was great to reconvene with many colleagues we hadn’t seen i...
Cybersecurity Secrets, Courtesy of the Russian FSB
Effective cybersecurity depends on understanding the threat: who is attacking a system, what tactics and techniques they are using, and what they hope to accomplish. Security professional...
Elevating the Federal Cybersecurity Discussion
We were thrilled to co-sponsor a compelling event–in person and virtually–with FCW that showcased senior-level cyber leaders from federal defense, civilian and intelligence agencies. ...
Cross Domain Solution Assessment & Authorization: Part 2 – Acronyms, Assessments, and Everything in Between
In our previous post, we discussed the purpose and goals of Assessment & Authorization (A&A) processes for various technologies, specifically with regard to U.S. Government testin...
Cross Domain Solution FAQ
Cross domain solutions have protected the world's most sensitive networks and data for more than 20 years. Despite the technology's widespread use within governmental, military, and intel...
Cross Domain Solution Assessment & Authorization: Part 1 – What is A&A?
Cross domain solutions (CDS) are network security devices which are designed to control and filter content (data) transferred between the most sensitive and classified networks within the...
Dave Britton Vice President, Assured Collaboration Systems
Secure, Scalable VoIP for Joint and Coalition Operations
Voice over IP (VoIP) communication has become an essential tool for the US military and intelligence community, but when information needs to flow across network boundaries, keeping the l...
Dave Britton Vice President, Assured Collaboration Systems
Building the Future of Cross Domain Security
In early January, Owl Cyber Defense announced the acquisition of the Assured Collaboration Systems (ACS) product line from Trident Systems Incorporated. This acquisition brings together t...