Blog Industry: Network Security
A Statement on Violence Against the Black Community from Owl Cyber Defense
As we absorb our communities’ pain and anger, we must demand change from ourselves. The heartbreaking racial acts and injustices towards the Black community across this country is a dis...
Sharada Prahladrao ARC Advisory Group
ARC Advisory Group – Owl Cyber Defense Workshop on Sustainable OT Cybersecurity Strategy
Cybersecurity is now at the forefront of all deliberations in a digitally connected world. Once again an entire day at the ARC Industry Forum in Orlando featured cybersecurity worksho...
Aileen Casmano Marketing Communications Manager
Staying Cyber-Aware While Social Distancing
Due to the COVID-19 (AKA "Coronavirus") pandemic, many organizations are implementing telework or work-from-home policies to maintain business continuity while “flattening the curve” ...
John McKeon Business Development Manager - Financial Services
Comments on the Upcoming NIST Special Publication 1800-25A
As you may or may not be aware, the National Cybersecurity Center of Excellence (NCCoE) at NIST has released a draft version of NIST Cybersecurity Practice Guide SP 1800-25 - Identifying ...
Charlie Schick Healthcare Consultant
A New Model for Secure IIoT Connectivity
I recently wrote a post about how IIoT devices are upending the Purdue Model as folks jump layers and stream data from the low layers directly up to the higher layers and beyond. Thinkin...
Charlie Schick Healthcare Consultant
How IIoT and the Cloud are Upending the Purdue Model in Manufacturing
The Purdue Model of Control Hierarchy is a framework commonly used by manufacturers in pharmaceuticals, oil and gas, food and beverage, and other verticals to group enterprise and industr...
Gary McGibbon Business Development Manager - Financial Services
Capital One as a Canary in the Cloud Coal Mine: Part 3 – Conclusions
If the Capital One sysadmin had just changed the WAF password...
In the final part of our blog series on the Capital One breach, I want to discuss the conclusions reached based on the vu...
Gary McGibbon Business Development Manager - Financial Services
Capital One as a Canary in the Cloud Coal Mine: Part 2 – Findings
"That is a pretty egregious oversight."
In the second part of our three part series on the Capital One breach, I want to discuss the vulnerabilities and other elements that went into the...
Gary McGibbon Business Development Manager - Financial Services
Capital One as a Canary in the Cloud Coal Mine: Part 1 – What Happened?
Was Capital One an aberration?
Recently released data from the 2019 IBM/Ponemon Cost of a Data Breach Report identifies financial services institutions as one of the top two industry gro...
Charlie Schick Healthcare Consultant
Running Away is Not a Good Cyber Strategy for Ransomware
There’s one common characteristic of folks who are in the cybersecurity world: we have an (admittedly dark) fascination with reading about hacks in the news. The intellectuals will try ...
Phil Won Product Manager
Addressing the Cybersecurity Skills Shortage
Even more difficult than getting approval for an added headcount to address your cybersecurity concerns is finding the right person to fill that hard-fought opening. There are two factors...
Dan Callahan Civilian Intelligence Account Executive
What’s Changing in Cybersecurity & Why it’s Important
Technology manufacturers in the global IT market occasionally come up for air in order to revalidate that our value propositions are still germane. Essentially, we like to know that we’...