I was particularly excited to write about cryptanalysis this month because I was fascinated with secret messages, spys, and the like when I was young. Encyclopedia Brown, Nancy Drew, lemon juice ink, pig latin, secret codes… I loved it all. With computers’ ability to solve equations at mind blowing speeds, software encryption goes beyond just replacing letters with numbers to create a code- way, way beyond.
If you’ve kept up with our last few blogs on security, you know there are multiple ways your system can be compromised. You will also know that as technology improves, so do hackers’ abilities. New software, hardware, and best practices are coming out all of the time to thwart attacks. It’s a large amount of information to keep up with. This is where system admins come in.Read More
Is my Stuff More Dangerous Now?
With technology growing at a mind-blowing pace, connecting devices to the internet and each other was the next obvious step. The Internet of Things (IoT) has changed the way we live and interact with our devices. Alongside the benefits are some real dangers we face as a result of this technology.Read More
Metova CyberCENTS Cyber Range Technology Selected for US Navy Persistent Cyber Training Environment
$2.5M Procurement Provides US Navy with Metova CyberCENTS’ Turn-Key Cyber Range and Persistent Training Environment Solution for the Navy Cyber Operations Training Simulator Program
Cabot, AR, August 18, 2016 - Metova CyberCENTS®, the cutting-edge authority in cybersecurity simulation and training and a Cybersecurity 500 honoree, today announced their selection as the cyber range persistent training environment (PTE) provider for the US Navy Cyber Operations Training Simulator (NCOTS) program.
The Metova Cyberoperations Enhanced Network and Training Simulator (CENTS®) platform provides the Navy with a turn-key cyber range persistent training environment that creates a realistic, resettable and safe network environment emulating Navy networks. The Navy Cyber Operations Training Simulator will be inclusive of cyber range builds for the Navy Cyber Defense Operations Command (NCDOC), the Network Operations Center (NOC), as well as ship environments. The cyber range will provide a full-time persistent training environment for the training and certification of Navy Cryptologic Technicians, Information Systems Technicians, Navy Teams (Red Team, Blue Team), Training and Assessment Visit Team as well as a NCDOC watch focused on cyber protection team missions and defensive cyber operations.
Metova CyberCENTS CYNTRS® platform will support both NCDOC and NOC functions. NCDOC and NOC range components will be interconnected to the five ship ranges provided by Metova’s HOTSIM®. The ship simulators will be able to function as part of the NCDOC and NOC interconnection, or each ship can function as a stand-alone range – permitting focused training for missions. Metova CyberCENTS’ Navy Cyber Operations Training Simulator solution will provide persistent training environments for echelon 2 and 3 of the Navy cyber workforce.
“These latest Metova CyberCENTS offerings provide a robust persistent training environment for cyber threat simulation and network emulation with a tailored Navy specific functionality and design required by Navy cyber forces” said Bill Dunn, president of Metova CyberCENTS. “We look forward to serving the US Navy’s Cyber Operations Training Simulator Program for training, testing and exercising cyberspace operations.”
Metova CyberCENTS’ CYNTRS and HOTSIM make up the hardware and virtual machine components for NCOTS providing the capabilities that bring a cyber range to life. The SLAM-R® hardware appliance provides VM/device management, a functioning Internet “grey space” with websites and social media, RFC compliant traffic generation and an event and attack framework for building scenarios and creating traffic profiles. Metova CyberCENTS Range Global Internet serves as the interconnecting hub where Navy Cyber Operations Training Simulator elements are integrated together for virtual dispersed global operations.
For more information on offerings including CENTS, CYNTRS, SLAM-R and RGI, or to schedule a demo please visit www.Cybercents.com
What is network sniffing? Information is sent across networks in groups called packets. Network sniffers then intercept these packets in order to find information about a network.
Chess, the Force, and Duct tape all have a dark side and a light side. Network sniffing is no different and can be used in both ethical and illegal ways. Developers often check the network in order to confirm the information they are sending is being received accurately and that there aren’t any problems. If there are, examining the network can help with troubleshooting and fixing. Illegal usage can span from simple information gathering to pretending to be a valid site or service to masquerading as a user.
What is Reverse Engineering?It is human nature to be curious about the world and how things work and then how to manipulate them. Imagine a growing baby. “What’s this thing attached to my body? Oh, an arm! I can move it! Hey, that shiny object sure looks interesting. Maybe I can use this arm thing to get it closer. There we go, now to just pick it up and taste it...” Read More
$3.8M Procurement Provides Air National Guard Cyber Forces with a distributed Cyber Range to Support Exercises, Conduct Training and Maintain Cyber Mission Ready ProficiencyRead More
As technology in security improves, so do hackers’ proficiency in hacking. Getting started with minimizing security risks and protecting your company doesn’t have to require a huge chunk of your budget or an in-house expert. Here are 5 simple ways you can start protecting your business today.Read More