Owl Blog
Thoughts and Insights from the Cybersecurity Industry
Carolyn Ford VP, Marketing
Parsing the Future: Mike Beckerle’s Legacy and the Power of Daffodil
In the world of secure data sharing, the hardest part isn’t building the walls, it’s translating across them.
As legacy systems, proprietary protocols, and outdated formats pile up, mission-critical operations increasingly rely on the ability to...

Carolyn Ford VP, Marketing
Parsing the Future: Mike Beckerle’s Legacy and the Power of Daffodil
In the world of secure data sharing, the hardest part isn’t building the walls, it’s translating across them.
As legacy systems, proprietary protocols, and outdated formats pile up,...
Daniel Bartucci Cyber Security Strategist - Critical Infrastructure
Applying Zero Trust in Industrial Control Systems: Where It Works and Where It Breaks
Zero Trust is now the dominant paradigm in enterprise cybersecurity, but its practical application in Industrial Control Systems (ICS) presents unique challenges and opportunities. In cri...
Firewalls vs. Data Diodes: Why Hardware-Enforced Security Is Mission Critical for the Department of War
The persistent and evolving threat landscape demands an unwavering commitment to network security. For the Department of War and other high-assurance organizations, mission resilience is ...
Billington Cybersecurity Summit 2025: Building Federal Resilience on the Cyber and AI Frontiers
The 16th Annual Billington Cybersecurity Summit once again affirmed its status as one of the most significant cybersecurity gatherings for government, industry, and defense leaders. Held ...
Daniel Bartucci Cyber Security Strategist - Critical Infrastructure
Securing What’s Next: OT Cyber Risk Insights 2025
There’s Never Been a More Critical Moment for OT Security
Informed by ten years of global breach and claims data and independent insurance industry analysis, the 2025 Dragos OT Secur...