Blog Industry: Network Security

It’s Not Personal, It’s a Cyber Attack
Security breaches happen so often, it can be difficult to find something new to say about them. That’s why we don’t go out of our way to comment on every incident that makes it into t...

Ken Walker Chief Technology Officer
Amnesia:33 and Ripple20 Highlight the Difference Between Hardware-Enforced CDS and Firewalls
For years, the NSA has been telling us that firewalls are worthless as defense against targeted nation-state attacks. Now we finally have some examples of why this is true.
On December...

Brian Romansky Chief Innovation Officer
Minimizing Risk with FPGAs and Hardware-Based Security
Conventional data security technology has entered a mode of persistent escalation. System designers invest heavily in design and validation, while attackers continually uncover, exploit, ...

Brian Romansky Chief Innovation Officer
Why Embed? The Value of Native Security in Industrial Controls
In recent years, threat actors have developed highly sophisticated tools to attack industrial control systems. Some attacks aim to steal data or infect user workstations, while other, mor...

Brian Romansky Chief Innovation Officer
Embedded Cybersecurity: A Paradigm Shift in Critical Infrastructure
The Shift from Stand-Alone To Embedded Cybersecurity
Industry 4.0, the ongoing move toward interconnectivity and automation in industrial process control, has opened a world of new po...

Cross Domain Solutions vs Firewalls
Transferring data securely between networks or systems with different security requirements is one of the fundamental challenges of cybersecurity. For a typical organization, the solution...

Solving the Data Format Problem with Daffodil
It goes without saying that to be useful anywhere, data has to be in some sort of format. But every time you start using a new data format, you have to tell your software how to use it, a...

John McKeon Business Development Manager - Financial Services
How Can SIEM Work with Air-Gapped Networks?
To keep a critical network safe, a common practice has traditionally been to establish an air gap – in other words, disconnect that network from “untrusted” or less secure networks,...

Brian Romansky Chief Innovation Officer
Vaccine-like Trials Could Allay Software Patch Concerns
A recent article from fortune.com implies that perhaps the Russian race to be the first to announce an approved vaccine for COVID-19 might circumvent the level of rigorous safety and effi...

Bill Caffery Strategic Technology Advisor
Closing the Barn Door?
According to yesterday’s NY Times (July 16, 2020) U.S. Intelligence agencies have revealed that a small but well-known hacking group associated with Russian Intelligence have been “ta...

Charlie Schick Healthcare Consultant
Protecting Information Amongst the Chaos
This week, new evidence emerged that a group linked to the Russian government, APT29 (also known as Cozy Bear), has been attacking and trying to steal COVID-19-related informati...

A Statement on Violence Against the Black Community from Owl Cyber Defense
As we absorb our communities’ pain and anger, we must demand change from ourselves. The heartbreaking racial acts and injustices towards the Black community across this country is a dis...