Security

9 06, 2017

Metova CyberCENTS & Sonalysts to Develop Cyber Training Simulators for USAF

By |2018-10-24T19:04:55+00:00June 9th, 2017|Security|

CABOT, Ark., June 8, 2017 /PRNewswire/ — Metova CyberCENTS, a cutting-edge authority in cybersecurity simulation and training, today announced the company has joined with Prime Contractor, Sonalysts, Inc., to develop interactive and immersive training simulators for US Air Force Cyber Weapon Systems. Phase I of the Small Business Innovation Research project includes identifying and defining the [...]

13 03, 2017

10 Threats to Mobile Security

By |2018-10-24T17:48:40+00:00March 13th, 2017|Security|

Mobile devices and applications are never devoid of vulnerabilities. When new features are added, so are new openings for potential threats. In order to continue to create mobile applications that our customers rely on and that we can be proud of, our developers stay on top of changes in operating systems and current best practices. [...]

8 02, 2017

SLAM-R Cybersecurity Solution Updated to 2.8

By |2018-09-27T14:58:48+00:00February 8th, 2017|Security|

CABOT, Ark., Feb. 7, 2017 /PRNewswire/ — Metova CyberCENTS, a cutting-edge authority in cybersecurity simulation and training and a Cybersecurity 500 honoree, today announced updates to SLAM-R©, the industry’s leading Cyber-Attack emulation and simulation technology. Metova CyberCENTS SLAM-R Cyber Range technology for persistent cyber training environments creates a digital environment that emulates a real world “mission [...]

18 01, 2017

Community Banking Cybersecurity

By |2018-08-14T15:45:02+00:00January 18th, 2017|Security|

A new year means new resolutions and this doesn’t exclude businesses. With the ever present threat of an impending cyber attack, preparing your company for such threats is a top priority. This is especially true for community banks in your local community.  […]

19 12, 2016

Tracking Steps and Security Threats

By |2018-09-27T14:05:54+00:00December 19th, 2016|Security|

 With today’s rapidly expanding IoT spectrum people are becoming increasingly connected. Not only through content and social media forums but also through health and wellness. One of the most prevalent ways this is happening is through the use of personal health wearables. This could be smart watches, fitness bands, or even smart clothing. All of [...]

12 10, 2016

CyberCENTS Sponsors ITEN Cyber Competition

By |2018-10-23T20:43:06+00:00October 12th, 2016|Security|

The ITEN Wired conference in Pensacola Beach, Florida begins today. We are proud that our sister company, CyberCENTS, is sponsoring the Cyber competition.  They are also providing CENTS®  (Cyber Operations Enhanced Network and Training Simulators) as the infrastructure for some of the events. The competition will consist of Cyber Defense, Cyber Offense, and Capture the [...]

6 10, 2016

Announcing Metova Solutions

By |2018-10-23T21:11:18+00:00October 6th, 2016|In the Press, Security|

Announcing Metova Solutions – a Provider of Military-Grade CyberSecurity Technologies, Training and Hardware for Corporations and Institutions New Cybersecurity Company With Patented, Military-tested Technology now Led by Security Luminary G.B. Cazes CONWAY, Ark., Oct. 6, 2016 /PRNewswire/ — Metova Inc today announced the launch of Metova Solutions, a provider of Military-grade cybersecurity technologies, training and hardware [...]

3 10, 2016

Cybersecurity- Computer Forensics

By |2018-10-01T21:33:13+00:00October 3rd, 2016|Security|

What is Computer Forensics?Electronic devices are extremely commonplace. As time goes on, more and more people not only have a device, but use multiple ones daily. People use them to enhance their social life with apps like Twitter, Facebook, or eHarmony. They keep schedules, communication, and other important data on them. Add to that all [...]

21 09, 2016

Decrypting Cryptography

By |2018-10-01T21:32:07+00:00September 21st, 2016|Security|

I was particularly excited to write about cryptanalysis this month because I was fascinated with secret messages, spys, and the like when I was young. Encyclopedia Brown, Nancy Drew, lemon juice ink, pig latin, secret codes… I loved it all. With computers’ ability to solve equations at mind blowing speeds, software encryption goes beyond just [...]

5 09, 2016

System Administrators, the Protectors of Networks

By |2018-09-27T14:44:53+00:00September 5th, 2016|Security|

If you’ve kept up with our last few blogs on security, you know there are multiple ways your system can be compromised. You will also know that as technology improves, so do hackers’ abilities. New software, hardware, and best practices are coming out all of the time to thwart attacks. It’s a large amount of [...]

Load More Posts