Owl Blog
Thoughts and Insights from the Cybersecurity Industry
Steve Stratton Author | Retired Green Beret | Cybersecurity Advisor
Operation Skipjack - Part 1
Chapter One INDOPACOM J3 Admiral Nikki Fury Camp H. M. Smith Aiea, Hawaii As I’m walking back to my office in the J3-Operations Directorate, I have a feeling something is not right. Minutes ago, the Chinese Navy and our Reagan Carrier Strike G...
Steve Stratton Author | Retired Green Beret | Cybersecurity Advisor
Operation Skipjack - Part 1
Chapter One INDOPACOM J3 Admiral Nikki Fury Camp H. M. Smith Aiea, Hawaii As I’m walking back to my office in the J3-Operations Directorate, I have a feeling something is not righ...
Dakota Fuller Director of Product Management
Unpacking Cross-Domain Technology: The Mechanics of Security and Efficiency
Artificial Intelligence (AI) is transforming national security, defense, and critical industries. However, AI is only as effective as the data it processes, and flawed data can lead to da...
Dakota Fuller Director of Product Management
Cross-Domain Solutions: The Backbone of AI Data Assurance
In today's interconnected world, managing artificial intelligence (AI)- powered systems is no longer just about harnessing computing power—it's about ensuring confidentiality, reliabili...
Secure. Flexible. Optimized: Introducing Owl Talon v3.2
The Owl Cyber Defense team is proud to announce the release of Owl Talon 3.2.0.0, which brings with it several new features designed to keep pace with rapidly evolving cybersecurity needs...
Mike Beckerle Principal, Services
Why Open-Source Software is Critical for Modern Cybersecurity
In today’s world, sharing information quickly and securely is crucial for military operations. The U.S., along with its allies, relies on real-time data exchange across different system...