5 09, 2016

System Administrators, the Protectors of Networks

By |2018-09-27T14:44:53+00:00September 5th, 2016|Categories: Security|Tags: |

If you’ve kept up with our last few blogs on security, you know there are multiple ways your system can be compromised. You will also know that as technology improves, so do hackers’ abilities. New software, hardware, and best practices are coming out all of the time to thwart attacks. It’s a large amount of [...]

24 08, 2016

IoT: Risks and Dangers

By |2018-10-24T18:42:54+00:00August 24th, 2016|Categories: Security|Tags: |

Is my Stuff More Dangerous Now?With technology growing at a mind-blowing pace, connecting devices to the internet and each other was the next obvious step. The Internet of Things (IoT) has changed the way we live and interact with our devices. Alongside the benefits are some real dangers we face as a result of this [...]

17 08, 2016

US Navy Persistent Cyber Training Environment

By |2018-09-26T21:52:08+00:00August 17th, 2016|Categories: In the Press, Security|Tags: , |

Metova CyberCENTS Cyber Range Technology Selected for US Navy Persistent Cyber Training Environment $2.5M Procurement Provides US Navy with Metova CyberCENTS’ Turn-Key Cyber Range and Persistent Training Environment Solution for the Navy Cyber Operations Training Simulator ProgramCabot, AR, August 18, 2016 – Metova CyberCENTS®, the cutting-edge authority in cybersecurity simulation and training and a Cybersecurity [...]

17 08, 2016

Network Sniffing

By |2018-09-28T13:28:28+00:00August 17th, 2016|Categories: Security|Tags: |

What is network sniffing? Information is sent across networks in groups called packets. Network sniffers then intercept these packets in order to find information about a network.Chess, the Force, and Duct tape all have a dark side and a light side. Network sniffing is no different and can be used in both ethical and illegal [...]

8 08, 2016

Reverse Engineering In Software

By |2018-09-27T15:06:43+00:00August 8th, 2016|Categories: Apple/iOS, Coding & Development, Security|Tags: , , |

What is Reverse Engineering?It is human nature to be curious about the world and how things work and then how to manipulate them. Imagine a growing baby. “What’s this thing attached to my body? Oh, an arm! I can move it! Hey, that shiny object sure looks interesting. Maybe I can use this arm thing [...]

25 07, 2016

Minimize Your Security Risk With These 5 Easy Tips

By |2018-09-28T13:26:41+00:00July 25th, 2016|Categories: Security|Tags: |

As technology in security improves, so do hackers’ proficiency in hacking. Getting started with minimizing security risks and protecting your company doesn’t have to require a huge chunk of your budget or an in-house expert.  Here are 5 simple ways you can start protecting your business today. […]

18 07, 2016

Advances in Risk Simulation

By |2018-10-24T14:21:12+00:00July 18th, 2016|Categories: Security, Tech News|Tags: , |

Sometimes experience is needed for situations where it’s not feasible to gain it in real-life. In these cases where safety, cost, and risk are too high, simulations, virtual reality, and artificial intelligence are picking up the slack. While risk simulations have been around for years, the technology has not gone stagnant. […]

Load More Posts