IoT: Risks and Dangers
Is my Stuff More Dangerous Now?
With technology growing at a mind-blowing pace, connecting devices to the internet and each other was the next obvious step. The Internet of Things (IoT) has changed the way we live and interact with our devices. Alongside the benefits are some real dangers we face as a result of this technology.
Read MoreWe Equip the World’s Next-Gen Cyber Defenders
It’s been an eventful month for Metova CyberCENTS.
Read MoreUS Navy Persistent Cyber Training Environment
Metova CyberCENTS Cyber Range Technology Selected for US Navy Persistent Cyber Training Environment
$2.5M Procurement Provides US Navy with Metova CyberCENTS’ Turn-Key Cyber Range and Persistent Training Environment Solution for the Navy Cyber Operations Training Simulator Program
Cabot, AR, August 18, 2016 - Metova CyberCENTS®, the cutting-edge authority in cybersecurity simulation and training and a Cybersecurity 500 honoree, today announced their selection as the cyber range persistent training environment (PTE) provider for the US Navy Cyber Operations Training Simulator (NCOTS) program.
The Metova Cyberoperations Enhanced Network and Training Simulator (CENTS®) platform provides the Navy with a turn-key cyber range persistent training environment that creates a realistic, resettable and safe network environment emulating Navy networks. The Navy Cyber Operations Training Simulator will be inclusive of cyber range builds for the Navy Cyber Defense Operations Command (NCDOC), the Network Operations Center (NOC), as well as ship environments. The cyber range will provide a full-time persistent training environment for the training and certification of Navy Cryptologic Technicians, Information Systems Technicians, Navy Teams (Red Team, Blue Team), Training and Assessment Visit Team as well as a NCDOC watch focused on cyber protection team missions and defensive cyber operations.
Metova CyberCENTS CYNTRS® platform will support both NCDOC and NOC functions. NCDOC and NOC range components will be interconnected to the five ship ranges provided by Metova’s HOTSIM®. The ship simulators will be able to function as part of the NCDOC and NOC interconnection, or each ship can function as a stand-alone range – permitting focused training for missions. Metova CyberCENTS’ Navy Cyber Operations Training Simulator solution will provide persistent training environments for echelon 2 and 3 of the Navy cyber workforce.
“These latest Metova CyberCENTS offerings provide a robust persistent training environment for cyber threat simulation and network emulation with a tailored Navy specific functionality and design required by Navy cyber forces” said Bill Dunn, president of Metova CyberCENTS. “We look forward to serving the US Navy’s Cyber Operations Training Simulator Program for training, testing and exercising cyberspace operations.”
Metova CyberCENTS’ CYNTRS and HOTSIM make up the hardware and virtual machine components for NCOTS providing the capabilities that bring a cyber range to life. The SLAM-R® hardware appliance provides VM/device management, a functioning Internet “grey space” with websites and social media, RFC compliant traffic generation and an event and attack framework for building scenarios and creating traffic profiles. Metova CyberCENTS Range Global Internet serves as the interconnecting hub where Navy Cyber Operations Training Simulator elements are integrated together for virtual dispersed global operations.
For more information on offerings including CENTS, CYNTRS, SLAM-R and RGI, or to schedule a demo please visit www.Cybercents.com
Network Sniffing
What is network sniffing? Information is sent across networks in groups called packets. Network sniffers then intercept these packets in order to find information about a network.
Chess, the Force, and Duct tape all have a dark side and a light side. Network sniffing is no different and can be used in both ethical and illegal ways. Developers often check the network in order to confirm the information they are sending is being received accurately and that there aren’t any problems. If there are, examining the network can help with troubleshooting and fixing. Illegal usage can span from simple information gathering to pretending to be a valid site or service to masquerading as a user.
WUSTL Security Roundtable and Cyber Defense Event
Metova to lead Washington University Students at The Technology & Leadership Center Security Roundtable
Read MoreReverse Engineering In Software
What is Reverse Engineering?
It is human nature to be curious about the world and how things work and then how to manipulate them. Imagine a growing baby. “What’s this thing attached to my body? Oh, an arm! I can move it! Hey, that shiny object sure looks interesting. Maybe I can use this arm thing to get it closer. There we go, now to just pick it up and taste it...” Read MoreCyberCENTS Selected for Air National Guard Cyber Training
$3.8M Procurement Provides Air National Guard Cyber Forces with a distributed Cyber Range to Support Exercises, Conduct Training and Maintain Cyber Mission Ready Proficiency
Read MoreMinimize Your Security Risk With These 5 Easy Tips
As technology in security improves, so do hackers’ proficiency in hacking. Getting started with minimizing security risks and protecting your company doesn’t have to require a huge chunk of your budget or an in-house expert. Here are 5 simple ways you can start protecting your business today.
Read MoreAdvances in Risk Simulation
Sometimes experience is needed for situations where it’s not feasible to gain it in real-life. In these cases where safety, cost, and risk are too high, simulations, virtual reality, and artificial intelligence are picking up the slack. While risk simulations have been around for years, the technology has not gone stagnant.
Read MoreMetova CyberCENTS Granted Patent for Cyber Attack Engine
Cabot, AR, Feb. 24, 2016 - Metova CyberCENTS®, a leader in cybersecurity simulation and training, today announced their Myrmidon Attack Framework was granted U.S. Patent No. 9,246,768 covering Systems and Methods for a Simulated Network Attack Generator. Specific innovations patented include: bot-based attacks, attribution to virtual users on the network, event and scenario creation and storing, automatic execution, as well as the actual effects the framework has on a network. The patent was formally submitted on June 18, 2009 making Myrmidon technology the first to market and CENTS® the first commercial platform to offer this unique type of cyber-training capabilities.
Read MoreMetova CyberCENTS Announces SLAM-R Update
Updated SLAM-R Sets New Bar for Cybersecurity Preparedness
Read MoreMetova CyberCENTS Named on CyberSecurity 500
Cybersecurity Pioneer Ranked #1 for Cyber Range Category
Read More