Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Meet NCDSMO Requirements for Zero-Trust Hardware-enforced Security Scott Coleman; Ken Walker; Shawn Campbell Without regularly collecting and sharing information between networks, military and intelligence operations come to a halt. But identifying and vettin... 1 year ago | 25 mins High Threat Networks: How to Securely Share Mission Critical Information Ken Walker, Owl Cyber Defense; John Fleming, Owl Cyber Defense; Olav Kjono, MBO Partners; Jay Kowalczyk, Nimbus Virga, Inc. U.S. military and intelligence missions and organizations are increasingly collecting and sharing information over the internet and other networks wit... 2 years ago | 68 mins Raising the Bar with Cross Domain Solutions Michelle Jordon As cyber threats continue to escalate in scale and frequency, it is imperative that cross domain solutions (CDS), which protect the world’s most sensi... 4 years ago | 26 mins Raising the Bar Shawn Campbell, Principal Product Manager for Government Solutions As cyber threats from criminal organizations and nation-states continue to rise, it’s critical that military and government organizations protect syst... 2 years ago | 62 mins OWT: The Perfect Solution for Meeting RTB Operational and Audit Requirements Scott Coleman, Shawn Campbell, Brian Romansky According to the latest Raise-the-Bar requirements from the NCDSMO for the U.S. Department of Defense (DoD) and Intelligence Community (IC), any activ... 1 year ago | 30 mins