Owl Cyber Defense
Secure by Design

Owl Blog

Cybersecurity, Technology News and Insights


After months of planning, we are thrilled to launch our new blog! Here you’ll find the hottest cybersecurity tech trends, latest industry news and helpful tips and tricks in mitigating cyber threats. As we continue to learn more about what our readers are interested in, we will work hard to create valuable content to help cyber security professionals with product innovations, news and insights on laws and regulations in #InfoSec.

We wanted a new way to collaborate and communicate with our community, share multimedia such as videos, use cases and other helpful resources. Visit often we have lots to share!

We look forward to growing with you as we embark on this new journey. Don’t forget to subscribe above and follow us on social media! Thanks for coming by!


America’s Water Infrastructure Act (AWIA) of 2018 – Prioritizing Cybersecurity Risk and Operational Resiliency

December 5, 2018

The recently signed America’s Water Infrastructure Act of 2018 is widely viewed as the most significant water infrastructure bill in decades. This comprehensive legislation was designed to authorize $6B in funds to address current water infrastructure projects, scrap $4B in existing development projects deemed unfeasible or no longer viable, and incentivize businesses to buy and use American products, while creating jobs and reducing regulation.

Read More
How Data Diode Cybersecurity is Being Used to Protect Critical Infrastructure in the Middle East

October 11, 2018

In late 2012, there was a severe, targeted malware cyber-attack on a number of oil & gas facilities using what became known as the Shamoon virus. This Windows-based malware differed from other types of attacks, which typically involved attempting to steal money or information, in that it was designed to aggressively seek paths across networks, seizing any hard disks it might find, wiping out all information, and rendering the hardware useless.

Read More
What Is Data Diode Technology & How Does It Work?

June 25, 2018

Today's business environment is increasingly digital, and more vulnerable than ever to cyberattack. Because of this, various network security technologies have been developed to protect organizational data and infrastructures. One of the most effective of these modern technologies is the data diode. Although it is one of the most effective network security tools available, you may not have heard of this technology and know little of what it does. Below, you'll find a description of what data diode technology is and how it works.

Read More
ReCon: A New Chapter | Embrace the Value of Secure Two-way Communication

June 8, 2018

I recently attended the DistribuTECH and OSIsoft PI World, as an exhibitor and a speaker, and I had a number of great conversations with attendees about cybersecurity in the industrial, commercial, and critical infrastructure verticals. These conversations ranged from the theoretical down to the specific technologies, such as Owl data diode solutions, and hit upon the varied requirements and challenges these particular industries face every day.

Read More
Implementing DHS Best Practices to Secure Industrial Control Systems

May 25, 2018

Modern advancements in industrial control systems (ICS) enable marked improvements in efficiency, production, reliability, and safety, all through increased use of “smart” assets and digital communications. However, this has led to a dependency on communication technology that is seemingly at odds with the ever-increasing pressure to enhance cybersecurity in ICS networks.

Read More
One-Way Data Flow, Secured by Design

March 30, 2018

We thought long and hard on what to write about for our first blog post. It’s a special milestone! But it was inevitable that we address the current news headlines around cyber-attacks, the risks and the strategies to fight these threats. The New York Times recently published an article announcing the Russia hacking of utilities and critical infrastructure. Though some infiltration did occur, this was solely and specifically on the network side, operations were untouched. This is thanks to a hardware-enforced security technology called a data diode.

Read More