• Jennifer Pike
  • Posted by Jennifer Pike
July 18, 2016

Sometimes experience is needed for situations where it’s not feasible to gain it in real-life. In these cases where safety, cost, and risk are too high, simulations, virtual reality, and artificial intelligence are picking up the slack. While risk simulations have been around for years, the technology has not gone stagnant.

Read More
  • Metova
  • Posted by Metova
May 5, 2016

Cabot, AR, Feb. 24, 2016 - Metova CyberCENTS®, a leader in cybersecurity simulation and training, today announced their Myrmidon Attack Framework was granted U.S. Patent No. 9,246,768 covering Systems and Methods for a Simulated Network Attack Generator. Specific innovations patented include: bot-based attacks, attribution to virtual users on the network, event and scenario creation and storing, automatic execution, as well as the actual effects the framework has on a network. The patent was formally submitted on June 18, 2009 making Myrmidon technology the first to market and CENTS® the first commercial platform to offer this unique type of cyber-training capabilities.

Read More
  • Metova
  • Posted by Metova
May 5, 2016

Updated SLAM-R Sets New Bar for Cybersecurity Preparedness

Read More
  • Metova
  • Posted by Metova
October 15, 2015

 

Leading Technology Company to Provide Support to Cyber Battle Lab’s Mission to Support the Warfighter

 

Read More
  • Dave Lane
  • Posted by Dave Lane
September 3, 2015

As our society increasingly uses mobile devices for financial transactions, information sharing, and social interactions, mobile devices will become an increasingly attractive target to cyber criminals. Metova's CTO, Dave Lane, has identified three opportunities to safeguard your users' information that should be taken into consideration when building a mobile application.

Read More
  • Dave Lane
  • Posted by Dave Lane
August 27, 2015

As mobile devices increase in usage and popularity, hackers have been looking for more ways to exploit them. People are using their devices in all aspects of their daily lives and are willing to share and store sensitive personal information in order to do so. Because there there is more information available for exploitation, hackers have begun to avoid the quick attack, preferring to wait in the shadows and silently gather data. This week, we will go into detail on the top four security threats Metova foresees in mobile.

Read More
  • Dave Lane
  • Posted by Dave Lane
August 20, 2015

Security best practices are constantly evolving to tackle the latest threats. Mobile devices such as smartphones and tablets are becoming the most commonly used general computing devices across the world. This growth has resulted in previously unimaginable levels of access to information. As mobile devices become more prominent in our daily lives, the opportunity to collect, alter, and exploit information about our personal and professional lives becomes an increasingly desirable target for cyber criminals.

Read More
  • Metova
  • Posted by Metova
August 13, 2015

Talk Business & Politics Roby Brock recently interviewed our CEO, John Adams about the intense growth we have shown and our growing need for developers. Take a look at the interview below!

Read More
  • Metova
  • Posted by Metova
September 3, 2014

Developing applications for the federal government differs from working with commercial clients in a few key ways. From proposal to testing to documentation, knowing what to expect from government contracts is the first step to winning and succeeding with them.

Read More