New Products, Patents, & Partnerships
News Feature

Hardware-Enforced Technology Necessary for Security, says Defense Cyber Strategist

July 12, 2021
Thought Leadership

Avoiding the Lose-Lose Choice Between Shutdown and Breakdown

May 17, 2021
When Colonial Pipeline shut down its operations on May 8th, it marked the first time a cyber attack disrupted the United States’ critical infrastructure on a national level. Though the attack caused no injuries or environmental damage, the widespread gas shortage and rising prices that resulted from the shutdown are real-world consequences that have affected the li...
News Feature

Colonial Pipeline hack: What is at risk and how we prevent this in the future

May 14, 2021
What is the cost of shutting down the Colonial Pipeline for an hour, a day, a week? We'll all feel it at the pump in the coming months, but the cost of preventing shutdowns by protecting the critical equipment pales in comparison. In this Quick-Response Report, Ken Walker, Owl's Chief Technology Officer, provides his take on the recent ransomware attack on Colo...
Press Release

Owl Cyber Defense Announces the Release of IXD – The World’s First Industrial Cross Domain Solution

May 11, 2021
Columbia, MD – May 11, 2021 – Owl Cyber Defense Solutions (“Owl”), the global market leader in cross domain and network security solutions, today announced the release of IXD – a groundbreaking new cross domain solution developed specifically for critical infrastructure network cybersecurity. This innovative development represents a revolutionary mi...
Thought Leadership

Air-Gapped Edge Gateways : Best Practices for Cloud Connectivity

May 3, 2021
Cloud connectivity offers a wealth of benefits for energy providers and other critical infrastructure operators. Sending data from operational technology devices to the cloud allows asset owners to use remote diagnostic and analysis tools, improve supply chain management, and take advantage of enhanced services from machine vendors and other providers. New connect...
News Feature

Dispelling the top 3 myths about data diodes

March 23, 2021
Hardware-based security is often misunderstood. Many people think of it only as a place to secure keys and cryptographic operations or a hardware-enhanced capability to do secure boot operations. While those are certainly important and valuable functions, there are hardware-based security technologies that go far beyond those limited capabilities. One such technology...
1 2 3 9

Insights to your Inbox

Stay informed with the latest cybersecurity news and resources.