Metova
Posted by Metova
June 20, 2017

NEWS: Announcing IoT Security Audit Services

World Leader in Mobile Apps, Embedded Systems and Cybersecurity Brings Expertise to...

Read More
Metova
Posted by Metova
June 9, 2017

Metova CyberCENTS & Sonalysts to Develop Cyber Training Simulators for USAF

CABOT, Ark., June 8, 2017 /PRNewswire/ -- Metova CyberCENTS, a cutting-edge authority in cybersecurity simulation and training, today announced the company has joined with Prime Contractor, Sonalysts, Inc., to develop interactive and immersive training simulators for US Air Force Cyber Weapon Systems. Phase I of the Small Business Innovation Research project includes identifying and defining the current state of cyber training capability for the Air Force. Assessing training capabilities and outlining a cyber training simulator that can leverage the current architecture and provide training with live, virtual, constructive, distributed, multi-unit exercises. The Sonalysts/Metova CyberCENTS team will consider the current state of US Air Force cyber training, existing capabilities and technology as well as real-world cyber threats. From the research, the team will propose a simulator solution capable of preparing Cyber Mission Force (CMF) Cyber Warriors with the ability to protect and defend Air Force networks against cyber attacks. Metova CyberCENTS, a division of Metova Federal, LLC., is at the forefront of extraordinary advances in constructive cyber range technology. Notably, the creation of Cyberoperations Enhanced Network and Training Simulators (CENTS®) platforms that provide an integrated, live, virtual, constructive cyber range environment for training, exercising, and testing full-spectrum cyberspace capabilities.  Metova CyberCENTS' Sentinel-Legion-Autobuild-Myrmidon-Reconstitution (SLAM-R©) powers each CENTS® platform and delivers fully attributable traffic and attacks. Metova CyberCENTS' cadre of cyber range solutions provide an immersive, network-safe environment for cyber training, exercises, tactics development and experimentation. The ease of integration and use is integral to providing cyber warriors with the skills and tools needed to prepare them for real-world cyber-attacks. For more information on offerings, or to schedule a demo please visit http://cybercents.com/

Read More
Jennifer Pike
Posted by Jennifer Pike
March 13, 2017

10 Threats to Mobile Security

Mobile devices and applications are never devoid of vulnerabilities. When new features are added, so are new openings for potential threats. In order to continue to create mobile applications that our customers rely on and that we can be proud of, our developers stay on top of changes in operating systems and current best practices.

Read More
Metova
Posted by Metova
February 8, 2017

SLAM-R Cybersecurity Solution Updated to 2.8

CABOT, Ark., Feb. 7, 2017 /PRNewswire/ -- Metova CyberCENTS, a cutting-edge authority in cybersecurity simulation and training and a Cybersecurity 500 honoree, today announced updates to SLAM-R©, the industry's leading Cyber-Attack emulation and simulation technology. Metova CyberCENTS SLAM-R Cyber Range technology for persistent cyber training environments creates a digital environment that emulates a real world "mission partner" network and Internet (gray) space. SLAM-R provides a risk-free persistent training environment for Cyber Protection and Cyber Operations professionals to train and exercise offensive and defensive measures and forensics on an off-line network that models their own environment.

Read More
Alexa Williams
Posted by Alexa Williams
January 18, 2017

Community Banking Cybersecurity

A new year means new resolutions and this doesn't exclude businesses. With the ever present threat of an impending cyber attack, preparing your company for such threats is a top priority. This is especially true for community banks in your local community. 

Read More
Alexa Williams
Posted by Alexa Williams
December 19, 2016

Tracking Steps and Security Threats

 

With today’s rapidly expanding IoT spectrum people are becoming increasingly connected. Not only through content and social media forums but also through health and wellness. One of the most prevalent ways this is happening is through the use of personal health wearables. This could be smart watches, fitness bands, or even smart clothing. All of these devices promise the notion of continually being dialed into a better level of health and wellness. For the most part, this is true! These devices are not only increasing in popularity, but also in technical capabilities. Some of the new exciting features being offered include: tracking of sleep patterns, heart rate monitoring, activity trackers, blood glucose levels, blood pressure tracking, etc. The possibilities of increased personal healthcare technology is virtually endless.

Read More
Jennifer Pike
Posted by Jennifer Pike
October 12, 2016

CyberCENTS Sponsors ITEN Cyber Competition

The ITEN Wired conference in Pensacola Beach, Florida begins today. We are proud that our sister company, CyberCENTS, is sponsoring the Cyber competition.  They are also providing CENTS®  (Cyber Operations Enhanced Network and Training Simulators) as the infrastructure for some of the events. The competition will consist of Cyber Defense, Cyber Offense, and Capture the Flag.

Read More
Metova
Posted by Metova
October 6, 2016

Announcing Metova Solutions

Announcing Metova Solutions - a Provider of Military-Grade CyberSecurity Technologies, Training and Hardware for Corporations and Institutions New Cybersecurity Company With Patented, Military-tested Technology now Led by Security Luminary G.B. Cazes CONWAY, Ark., Oct. 6, 2016 /PRNewswire/ -- Metova Inc today announced the launch of Metova Solutions, a provider of Military-grade cybersecurity technologies, training and hardware for corporations and institutions. Metova Solutions leverages Metova CyberCENTS industry-leading cybersecurity offerings used by entities including the US Navy, Air National Guard and Department of Defense to provide companies, including health care providers, banks, as well as public and private institutions such as universities and state/local governments, with the highest level of cybersecurity hardware, training and technology available. Metova Solutions technology meticulously replicates a network, allowing organizations to test and validate strategic configurations before they are implemented. Metova Solutions' replicated network provides a safe and secure training environment to hone cyber defense tactics, techniques and procedures in response to new cyber threats and attacks. Metova Solutions offerings enable cybersecurity program directors, curriculum developers, educators, trainers and employers to build cyberspace simulations to develop a workforce that adheres to the National Initiative for Cybersecurity Education (NICE) Workforce Framework that is aligned with relevant Specialty Area Knowledge Skills and Abilities. Metova Solutions' patented suite of tools and hardware prepare organizations for even the most cunning and sophisticated cyber attack. Metova Solutions provides critical network penetration testing to identify and mitigate vulnerabilities before they are exploited by cyber attackers. Metova Solutions technicians continually scour the cyber landscape to uncover the latest attack technologies and scenarios perpetrated by cyber hackers. Metova Solutions fully supports all organizations implementing risk mitigating cybersecurity policies and procedures. To lead efforts, Metova Solutions is announcing the appointment of G.B. Cazes as president at Metova Solutions. Mr. Cazes has served as vice president at Cyber Innovation Center and executive director, National Integrated Cyber Education Research Center. Cazes also serves on national and state cybersecurity education boards and is an architect of the nation's model for cyber education. "We've taken our battle-tested, patented technology from Metova CyberCENTs and made it available and accessible to non-military entities," said G.B. Cazes, president at Metova Solutions. "Whether you are a small to medium size business, health care provider, bank or a globally positioned corporation, we offer unparalleled resources to help prepare anyone for the ever-evolving threat of cyber attack." For more information on Metova Solutions, please visit MetovaSolutions.com

Read More
Jennifer Pike
Posted by Jennifer Pike
October 3, 2016

Cybersecurity- Computer Forensics

What is Computer Forensics?

Electronic devices are extremely commonplace. As time goes on, more and more people not only have a device, but use multiple ones daily. People use them to enhance their social life with apps like Twitter, Facebook, or eHarmony. They keep schedules, communication, and other important data on them. Add to that all of the information that applications and companies like Google collect, and you could learn a ton about a person you’d never met just by accessing the information on their device. Collecting information from a device for use in a court of law is the purpose of computer forensics.

Read More
Jennifer Pike
Posted by Jennifer Pike
September 21, 2016

Decrypting Cryptography

I was particularly excited to write about cryptanalysis this month because I was fascinated with secret messages, spys, and the like when I was young. Encyclopedia Brown, Nancy Drew, lemon juice ink, pig latin, secret codes… I loved it all. With computers’ ability to solve equations at mind blowing speeds, software encryption goes beyond just replacing letters with numbers to create a code- way, way beyond.  

Read More
Jennifer Pike
Posted by Jennifer Pike
September 5, 2016

System Administrators, the Protectors of Networks

If you’ve kept up with our last few blogs on security, you know there are multiple ways your system can be compromised. You will also know that as technology improves, so do hackers’ abilities. New software, hardware, and best practices are coming out all of the time to thwart attacks. It’s a large amount of information to keep up with. This is where system admins come in.

Read More
Matthew Burton
Posted by Matthew Burton
August 24, 2016

IoT: Risks and Dangers

Is my Stuff More Dangerous Now?

With technology growing at a mind-blowing pace, connecting devices to the internet and each other was the next obvious step. The Internet of Things (IoT) has changed the way we live and interact with our devices. Alongside the benefits are some real dangers we face as a result of this technology.

Read More
We use cookies to give you the best experience.