New Products, Patents, & Partnerships
Owl Cyber Defense Opens Regional Technology Hub in Abu Dhabi
New Office Demonstrates Company’s Commitment to Regional Customers and Ensures Access to Leading Hardware-Based Cybersecurity Solutions to Protect Critical Infrastructure Columbia, MD and Abu Dhabi, UAE – July 14, 2021 – Owl Cyber Defense Solutions (“Owl”), the global market leader in cross domain and network security solutions, today a...
Hardware-Enforced Technology Necessary for Security, says Defense Cyber Strategist
July 12, 2021
Avoiding the Lose-Lose Choice Between Shutdown and Breakdown
May 17, 2021
When Colonial Pipeline shut down its operations on May 8th, it marked the first time a cyber attack disrupted the United States’ critical infrastructure on a national level. Though the attack caused no injuries or environmental damage, the widespread gas shortage and rising prices that resulted from the shutdown are real-world consequences that have affected the li...
Colonial Pipeline hack: What is at risk and how we prevent this in the future
May 14, 2021
What is the cost of shutting down the Colonial Pipeline for an hour, a day, a week? We'll all feel it at the pump in the coming months, but the cost of preventing shutdowns by protecting the critical equipment pales in comparison. In this Quick-Response Report, Ken Walker, Owl's Chief Technology Officer, provides his take on the recent ransomware attack on Colo...
Owl Cyber Defense Announces the Release of IXD – The World’s First Industrial Cross Domain Solution
May 11, 2021
Columbia, MD – May 11, 2021 – Owl Cyber Defense Solutions (“Owl”), the global market leader in cross domain and network security solutions, today announced the release of IXD – a groundbreaking new cross domain solution developed specifically for critical infrastructure network cybersecurity. This innovative development represents a revolutionary mi...
Air-Gapped Edge Gateways : Best Practices for Cloud Connectivity
May 3, 2021
Cloud connectivity offers a wealth of benefits for energy providers and other critical infrastructure operators. Sending data from operational technology devices to the cloud allows asset owners to use remote diagnostic and analysis tools, improve supply chain management, and take advantage of enhanced services from machine vendors and other providers. New connect...
Dispelling the top 3 myths about data diodes
March 23, 2021
Hardware-based security is often misunderstood. Many people think of it only as a place to secure keys and cryptographic operations or a hardware-enhanced capability to do secure boot operations. While those are certainly important and valuable functions, there are hardware-based security technologies that go far beyond those limited capabilities. One such technology...
Insights to your Inbox
Stay informed with the latest cybersecurity news and resources.