News
New Products, Patents, & Partnerships
News Feature
Hardware-Enforced Technology Necessary for Security, says Defense Cyber Strategist
July 12, 2021
https://www.youtube.com/watch?v=GXuKu58z8Bg
Thought Leadership
Avoiding the Lose-Lose Choice Between Shutdown and Breakdown
May 17, 2021
When Colonial Pipeline shut down its operations on May 8th, it marked the first time a cyber attack disrupted the United States’ critical infrastructure on a national level. Though the attack caused no injuries or environmental damage, the widespread gas shortage and rising prices that resulted from the shutdown are real-world consequences that have affected the li...
News Feature
Colonial Pipeline hack: What is at risk and how we prevent this in the future
May 14, 2021
What is the cost of shutting down the Colonial Pipeline for an hour, a day, a week? We'll all feel it at the pump in the coming months, but the cost of preventing shutdowns by protecting the critical equipment pales in comparison. In this Quick-Response Report, Ken Walker, Owl's Chief Technology Officer, provides his take on the recent ransomware attack on Colo...
Press Release
Owl Cyber Defense Announces the Release of IXD – The World’s First Industrial Cross Domain Solution
May 11, 2021
Columbia, MD – May 11, 2021 – Owl Cyber Defense Solutions (“Owl”), the global market leader in cross domain and network security solutions, today announced the release of IXD – a groundbreaking new cross domain solution developed specifically for critical infrastructure network cybersecurity. This innovative development represents a revolutionary mi...
Thought Leadership
Air-Gapped Edge Gateways : Best Practices for Cloud Connectivity
May 3, 2021
Cloud connectivity offers a wealth of benefits for energy providers and other critical infrastructure operators. Sending data from operational technology devices to the cloud allows asset owners to use remote diagnostic and analysis tools, improve supply chain management, and take advantage of enhanced services from machine vendors and other providers. New connect...
News Feature
Dispelling the top 3 myths about data diodes
March 23, 2021
Hardware-based security is often misunderstood. Many people think of it only as a place to secure keys and cryptographic operations or a hardware-enhanced capability to do secure boot operations. While those are certainly important and valuable functions, there are hardware-based security technologies that go far beyond those limited capabilities. One such technology...
Insights to your Inbox
Stay informed with the latest cybersecurity news and resources.