Owl Evolution Summit - Operation: Decision Advantage...Reserve Your Seat Today! Register Here.
Government
Government
Solutions
Products US Cross Domain Solutions International Solution Data Diodes Secure Collaboration Tools Removable Media Security
Use Cases Defense Intelligence Communities Civilian Government
Services Support Training Solutions Engineering
Learn
About Data Diodes About Cross Domain Solutions Resource Library Video Resource Library Owl GitHub
Contact Us
Tech Support Request a Quote
Commercial
Commercial
Solutions
Products Cross Domain Solutions Data Diodes
Use Cases Critical Infrastructure Dell
Services Support Training Solutions Engineering
Learn
About Data Diodes About Cross Domain Solutions Resource Library Video Resource Library Owl GitHub
Contact Us
Tech Support Request a Quote
Company
Company
who we are
About Owl Our Process Blog News Webinars Events Careers
Partners
Become a Partner Find a Distributor Dell Technologies
Unpacking Cross-Domain Technology: The Mechanics of Security and Efficiency
Artificial Intelligence (AI) is transforming national security, defense, and critical industries.
Read More
Tech Support Request a Quote
Logo
Tech Support Request a Quote
Logo
goverment
Hit Enter to Search or ESC to close

Blog Industry: ICS

Cross Domain Solutions vs Firewalls

Transferring data securely between networks or systems with different security requirements is one of the fundamental challenges of cybersecurity. For a typical organization, the solution...
November 10, 2020

Solving the Data Format Problem with Daffodil

It goes without saying that to be useful anywhere, data has to be in some sort of format. But every time you start using a new data format, you have to tell your software how to use it, a...
November 5, 2020
John McKeon Business Development Manager - Financial Services

How Can SIEM Work with Air-Gapped Networks?

To keep a critical network safe, a common practice has traditionally been to establish an air gap – in other words, disconnect that network from “untrusted” or less secure networks,...
October 7, 2020
Brian Romansky Chief Innovation Officer

Vaccine-like Trials Could Allay Software Patch Concerns

A recent article from fortune.com implies that perhaps the Russian race to be the first to announce an approved vaccine for COVID-19 might circumvent the level of rigorous safety and effi...
July 28, 2020
Time Bomb
Charlie Schick Healthcare Consultant

VxWorks URGENT/11 – When Your Reliable System is Actually a Time Bomb

What You Need to Know Eleven critical vulnerabilities were found in a leading real-time operating system (RTOS) used in many industries, by leading vendors - VxWorks. The nature and scal...
April 29, 2020
Sharada Prahladrao ARC Advisory Group

ARC Advisory Group – Owl Cyber Defense Workshop on Sustainable OT Cybersecurity Strategy

Cybersecurity is now at the forefront of all deliberations in a digitally connected world.  Once again an entire day at the ARC Industry Forum in Orlando featured cybersecurity worksho...
April 16, 2020
NIST Comments
John McKeon Business Development Manager - Financial Services

Comments on the Upcoming NIST Special Publication 1800-25A

As you may or may not be aware, the National Cybersecurity Center of Excellence (NCCoE) at NIST has released a draft version of NIST Cybersecurity Practice Guide SP 1800-25 - Identifying ...
March 10, 2020
Bioreactor Demo
Charlie Schick Pharma and Healthcare Consultant

Total Geekery: Data Diode Bioreactor Demo

This post will be on the light side, describing a demo I had fun making and about which my co-workers are tired of hearing me speak. Nonetheless, despite the geekiness of the demo, it was...
November 21, 2019
How Will You Securely Expand Your PI System to Include Contract Manufacturers?
Charlie Schick Healthcare Consultant

How Will You Securely Expand Your PI System to Include Contract Manufacturers?

So you want to optimize your manufacturing operations. The competitive landscape virtually demands it, driving efficiency into every facet of every process across your organization and be...
October 30, 2019
Charlie Schick Healthcare Consultant

A New Model for Secure IIoT Connectivity

I recently wrote a post about how IIoT devices are upending the Purdue Model as folks jump layers and stream data from the low layers directly up to the higher layers and beyond. Thinkin...
September 23, 2019
Charlie Schick Healthcare Consultant

How IIoT and the Cloud are Upending the Purdue Model in Manufacturing

The Purdue Model of Control Hierarchy is a framework commonly used by manufacturers in pharmaceuticals, oil and gas, food and beverage, and other verticals to group enterprise and industr...
September 11, 2019
Charlie Schick Healthcare Consultant

Running Away is Not a Good Cyber Strategy for Ransomware

There’s one common characteristic of folks who are in the cybersecurity world: we have an (admittedly dark) fascination with reading about hacks in the news. The intellectuals will try ...
July 11, 2019
Prev
1 2 3 4
Next

Insights to your Inbox

Stay informed with the latest cybersecurity news and resources.

  • This field is for validation purposes and should be left unchanged.

Request Information

We pride ourselves on being experts in data diode cybersecurity. Reach out and a member of our team will share more insight with you.

Request Info
Logo
8840 Stanford Blvd., Suite 2100
Columbia, MD 21045

Government

  • US Cross Domain Solutions
  • International Solutions
  • Data Diodes
  • Secure Collaboration Tools 
  • Removable Media Security

Use Cases

  • Defense
  • Intelligence Communities
  • Civilian Government

Services

  • Support
  • Training
  • Solutions Engineering

Commercial

  • Cross Domain Solutions
  • Data Diodes

Use Cases

  • Critical Infrastructure
  • Dell

Services

  • Support
  • Training
  • Solutions Engineering

Learn

Government

  • About Data Diodes
  • About Cross Domain Solutions
  • Resource Library
  • Video Resource Library

Commercial

  • About Data Diodes
  • About Cross Domain Solutions
  • Resource Library
  • Video Resource Library

Company

  • About Owl
  • Our Process
  • Blog
  • News
  • Webinars
  • Events
  • Careers
  • OPDS Solutions Suite

Partners

  • Become a Partner
  • Find a Distributor
  • Dell Technologies
©2025 Owl Cyber Defense
  • Terms of Use & Privacy Policy
  • Terms of Sale
  • Purchase Terms & Conditions
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies. However you may visit Cookie Settings to provide a controlled consent.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
Save & Accept
Request a Quote