Developing your website with security in mind Your website is a critical...Read More
Mobile devices and applications are never devoid of vulnerabilities. When new features are added, so are new openings for potential threats. In order to continue to create mobile applications that our customers rely on and that we can be proud of, our developers stay on top of changes in operating systems and current best practices.Read More
We sat down with Metova’s CTO Andrew Cowart to understand the ins...Read More
CABOT, Ark., June 8, 2017 /PRNewswire/ -- Metova CyberCENTS, a cutting-edge authority in cybersecurity simulation and training, today announced the company has joined with Prime Contractor, Sonalysts, Inc., to develop interactive and immersive training simulators for US Air Force Cyber Weapon Systems.Read More
CABOT, Ark., Feb. 7, 2017 /PRNewswire/ -- Metova CyberCENTS, a cutting-edge authority in cybersecurity simulation and training and a Cybersecurity 500 honoree, today announced updates to SLAM-R©, the industry's leading Cyber-Attack emulation and simulation technology. Metova CyberCENTS SLAM-R Cyber Range technology for persistent cyber training environments creates a digital environment that emulates a real world "mission partner" network and Internet (gray) space. SLAM-R provides a risk-free persistent training environment for Cyber Protection and Cyber Operations professionals to train and exercise offensive and defensive measures and forensics on an off-line network that models their own environment.Read More
A new year means new resolutions and this doesn't exclude businesses. With the ever present threat of an impending cyber attack, preparing your company for such threats is a top priority. This is especially true for community banks in your local community.Read More
With today’s rapidly expanding IoT spectrum people are becoming increasingly connected. Not only through content and social media forums but also through health and wellness. One of the most prevalent ways this is happening is through the use of personal health wearables. This could be smart watches, fitness bands, or even smart clothing. All of these devices promise the notion of continually being dialed into a better level of health and wellness. For the most part, this is true! These devices are not only increasing in popularity, but also in technical capabilities. Some of the new exciting features being offered include: tracking of sleep patterns, heart rate monitoring, activity trackers, blood glucose levels, blood pressure tracking, etc. The possibilities of increased personal healthcare technology is virtually endless.Read More
The ITEN Wired conference in Pensacola Beach, Florida begins today. We are proud that our sister company, CyberCENTS, is sponsoring the Cyber competition. They are also providing CENTS® (Cyber Operations Enhanced Network and Training Simulators) as the infrastructure for some of the events. The competition will consist of Cyber Defense, Cyber Offense, and Capture the Flag.Read More
Announcing Metova Solutions - a Provider of Military-Grade CyberSecurity Technologies, Training and Hardware for Corporations and Institutions New Cybersecurity Company With Patented, Military-tested Technology now Led by Security Luminary G.B. Cazes CONWAY, Ark., Oct. 6, 2016 /PRNewswire/ -- Metova Inc today announced the launch of Metova Solutions, a provider of Military-grade cybersecurity technologies, training and hardware for corporations and institutions. Metova Solutions leverages Metova CyberCENTS industry-leading cybersecurity offerings used by entities including the US Navy, Air National Guard and Department of Defense to provide companies, including health care providers, banks, as well as public and private institutions such as universities and state/local governments, with the highest level of cybersecurity hardware, training and technology available. Metova Solutions technology meticulously replicates a network, allowing organizations to test and validate strategic configurations before they are implemented. Metova Solutions' replicated network provides a safe and secure training environment to hone cyber defense tactics, techniques and procedures in response to new cyber threats and attacks. Metova Solutions offerings enable cybersecurity program directors, curriculum developers, educators, trainers and employers to build cyberspace simulations to develop a workforce that adheres to the National Initiative for Cybersecurity Education (NICE) Workforce Framework that is aligned with relevant Specialty Area Knowledge Skills and Abilities. Metova Solutions' patented suite of tools and hardware prepare organizations for even the most cunning and sophisticated cyber attack. Metova Solutions provides critical network penetration testing to identify and mitigate vulnerabilities before they are exploited by cyber attackers. Metova Solutions technicians continually scour the cyber landscape to uncover the latest attack technologies and scenarios perpetrated by cyber hackers. Metova Solutions fully supports all organizations implementing risk mitigating cybersecurity policies and procedures. To lead efforts, Metova Solutions is announcing the appointment of G.B. Cazes as president at Metova Solutions. Mr. Cazes has served as vice president at Cyber Innovation Center and executive director, National Integrated Cyber Education Research Center. Cazes also serves on national and state cybersecurity education boards and is an architect of the nation's model for cyber education. "We've taken our battle-tested, patented technology from Metova CyberCENTs and made it available and accessible to non-military entities," said G.B. Cazes, president at Metova Solutions. "Whether you are a small to medium size business, health care provider, bank or a globally positioned corporation, we offer unparalleled resources to help prepare anyone for the ever-evolving threat of cyber attack." For more information on Metova Solutions, please visit MetovaSolutions.comRead More
What is Computer Forensics?
Electronic devices are extremely commonplace. As time goes on, more and more people not only have a device, but use multiple ones daily. People use them to enhance their social life with apps like Twitter, Facebook, or eHarmony. They keep schedules, communication, and other important data on them. Add to that all of the information that applications and companies like Google collect, and you could learn a ton about a person you’d never met just by accessing the information on their device. Collecting information from a device for use in a court of law is the purpose of computer forensics.Read More
I was particularly excited to write about cryptanalysis this month because I was fascinated with secret messages, spys, and the like when I was young. Encyclopedia Brown, Nancy Drew, lemon juice ink, pig latin, secret codes… I loved it all. With computers’ ability to solve equations at mind blowing speeds, software encryption goes beyond just replacing letters with numbers to create a code- way, way beyond.
If you’ve kept up with our last few blogs on security, you know there are multiple ways your system can be compromised. You will also know that as technology improves, so do hackers’ abilities. New software, hardware, and best practices are coming out all of the time to thwart attacks. It’s a large amount of information to keep up with. This is where system admins come in.Read More