Owl Blog

Thoughts and Insights from the Cybersecurity Industry
Steve Stratton Author | Retired Green Beret | Cybersecurity Advisor

Operation Skipjack - Part 1

Chapter One  INDOPACOM J3 Admiral Nikki Fury  Camp H. M. Smith Aiea, Hawaii  As I’m walking back to my office in the J3-Operations Directorate, I have a feeling something is not right. Minutes ago, the Chinese Navy and our Reagan Carrier Strike G...
March 24, 2025
Steve Stratton Author | Retired Green Beret | Cybersecurity Advisor

Operation Skipjack - Part 1

Chapter One  INDOPACOM J3 Admiral Nikki Fury  Camp H. M. Smith Aiea, Hawaii  As I’m walking back to my office in the J3-Operations Directorate, I have a feeling something is not righ...
March 24, 2025
Filters
Sort By:
Dakota Fuller Director of Product Management

Unpacking Cross-Domain Technology: The Mechanics of Security and Efficiency

Artificial Intelligence (AI) is transforming national security, defense, and critical industries. However, AI is only as effective as the data it processes, and flawed data can lead to da...
March 10, 2025
Data Field Anomaly Detection
Dakota Fuller Director of Product Management

Cross-Domain Solutions: The Backbone of AI Data Assurance

In today's interconnected world, managing artificial intelligence (AI)- powered systems is no longer just about harnessing computing power—it's about ensuring confidentiality, reliabili...
March 3, 2025

Secure. Flexible. Optimized: Introducing Owl Talon v3.2

The Owl Cyber Defense team is proud to announce the release of Owl Talon 3.2.0.0, which brings with it several new features designed to keep pace with rapidly evolving cybersecurity needs...
March 3, 2025
Mike Beckerle Principal, Services

Why Open-Source Software is Critical for Modern Cybersecurity

In today’s world, sharing information quickly and securely is crucial for military operations. The U.S., along with its allies, relies on real-time data exchange across different system...
February 18, 2025
Prev
1 2 3 22
Next