20 06, 2017

NEWS: Announcing IoT Security Audit Services

By |2018-10-24T18:21:30+00:00June 20th, 2017|Categories: Internet of Things, Metova Press Releases|Tags: , , |

World Leader in Mobile Apps, Embedded Systems and Cybersecurity Brings Expertise to Secure IoT Devices and the Connected Home FRANKLIN, Tenn. and CONWAY, Ark., June 20, 2017 /PRNewswire/ -- Metova, a world leading app, IoT and development company with customers including Microsoft, Yale, eHarmony and Dropbox, today announced a new IoT Security Audit Service allowing companies to test [...]

9 06, 2017

Metova CyberCENTS & Sonalysts to Develop Cyber Training Simulators for USAF

By |2018-10-24T19:04:55+00:00June 9th, 2017|Categories: Security|Tags: |

CABOT, Ark., June 8, 2017 /PRNewswire/ — Metova CyberCENTS, a cutting-edge authority in cybersecurity simulation and training, today announced the company has joined with Prime Contractor, Sonalysts, Inc., to develop interactive and immersive training simulators for US Air Force Cyber Weapon Systems. Phase I of the Small Business Innovation Research project includes identifying and defining the [...]

13 03, 2017

10 Threats to Mobile Security

By |2018-10-24T17:48:40+00:00March 13th, 2017|Categories: Security|Tags: |

Mobile devices and applications are never devoid of vulnerabilities. When new features are added, so are new openings for potential threats. In order to continue to create mobile applications that our customers rely on and that we can be proud of, our developers stay on top of changes in operating systems and current best practices. [...]

8 02, 2017

SLAM-R Cybersecurity Solution Updated to 2.8

By |2018-09-27T14:58:48+00:00February 8th, 2017|Categories: Security|Tags: |

CABOT, Ark., Feb. 7, 2017 /PRNewswire/ — Metova CyberCENTS, a cutting-edge authority in cybersecurity simulation and training and a Cybersecurity 500 honoree, today announced updates to SLAM-R©, the industry’s leading Cyber-Attack emulation and simulation technology. Metova CyberCENTS SLAM-R Cyber Range technology for persistent cyber training environments creates a digital environment that emulates a real world “mission [...]

18 01, 2017

Community Banking Cybersecurity

By |2018-08-14T15:45:02+00:00January 18th, 2017|Categories: Security|Tags: |

A new year means new resolutions and this doesn’t exclude businesses. With the ever present threat of an impending cyber attack, preparing your company for such threats is a top priority. This is especially true for community banks in your local community.  […]

19 12, 2016

Tracking Steps and Security Threats

By |2018-09-27T14:05:54+00:00December 19th, 2016|Categories: Security|Tags: |

 With today’s rapidly expanding IoT spectrum people are becoming increasingly connected. Not only through content and social media forums but also through health and wellness. One of the most prevalent ways this is happening is through the use of personal health wearables. This could be smart watches, fitness bands, or even smart clothing. All of [...]

12 10, 2016

CyberCENTS Sponsors ITEN Cyber Competition

By |2018-10-23T20:43:06+00:00October 12th, 2016|Categories: Security|Tags: |

The ITEN Wired conference in Pensacola Beach, Florida begins today. We are proud that our sister company, CyberCENTS, is sponsoring the Cyber competition.  They are also providing CENTS®  (Cyber Operations Enhanced Network and Training Simulators) as the infrastructure for some of the events. The competition will consist of Cyber Defense, Cyber Offense, and Capture the [...]

6 10, 2016

Announcing Metova Solutions

By |2018-10-23T21:11:18+00:00October 6th, 2016|Categories: In the Press, Security|Tags: , |

Announcing Metova Solutions – a Provider of Military-Grade CyberSecurity Technologies, Training and Hardware for Corporations and Institutions New Cybersecurity Company With Patented, Military-tested Technology now Led by Security Luminary G.B. Cazes CONWAY, Ark., Oct. 6, 2016 /PRNewswire/ — Metova Inc today announced the launch of Metova Solutions, a provider of Military-grade cybersecurity technologies, training and hardware [...]

3 10, 2016

Cybersecurity- Computer Forensics

By |2018-10-01T21:33:13+00:00October 3rd, 2016|Categories: Security|Tags: |

What is Computer Forensics?Electronic devices are extremely commonplace. As time goes on, more and more people not only have a device, but use multiple ones daily. People use them to enhance their social life with apps like Twitter, Facebook, or eHarmony. They keep schedules, communication, and other important data on them. Add to that all [...]

21 09, 2016

Decrypting Cryptography

By |2018-10-01T21:32:07+00:00September 21st, 2016|Categories: Security|Tags: |

I was particularly excited to write about cryptanalysis this month because I was fascinated with secret messages, spys, and the like when I was young. Encyclopedia Brown, Nancy Drew, lemon juice ink, pig latin, secret codes… I loved it all. With computers’ ability to solve equations at mind blowing speeds, software encryption goes beyond just [...]

Load More Posts