At the early age of thirteen Powell, discovered his passion for coding while developing COBOL-based software. Ethical hacking was Powell’s high school hobby as he learned the inner workings of IT systems. While enrolled in the United States Navy, he learned the importance of confidentiality, integrity, availability, and proper work ethics. Combining his passion and knowledge of the cyber world with his experience as a Cyber Security Officer in the government, enabled Powell to found Cyberspace Armor LLC.
“Our goal is to educate businesses and millennial workforces about cybersecurity threats. Cyber security awareness is almost non-existent to the average business owner - until their systems get hacked and resources are lost, like confidential information or business income.” Cyberspace Armor provides end-to-end protection of systems, networks, and data from prevalent cybersecurity threats. “We focus on software development, compliance, threat monitoring, and artificial intelligence. My philosophy is that any problem could be resolved with the appropriate amount of dedication and education,” says Powell.
We intend to be an influencer in the cybersecurity space within the next 5-10 years
In one instance, Cyberspace Armor was entrusted with a colossal project dealing with security of multiple IT systems. Working with McAfee virus protection systems and end-point encryption “We evaluated the network, hardware, and software for issues; and mitigated all existing threats within a short period by placing systems with issues in quarantine, removing viruses, and patching procedure,” says Powell. Cyberspace Armor develops custom solutions to cyber threats, including the hardware, to support an IT infrastructure.
“If your business is experiencing cyber threats or has been attacked, call or text 855-CYBERWAR. A live customer service representative is available 24/7 365.”
Cyberspace Armor is developing a product that functions as a vaccination for virtual infrastructure. The virus will be introduced to train the system, and the attack will be confronted by smart utilization of AI. The product will be signature based and would learn the behavior of the user as well as the system. In addition to combating threats known to the system, the product will be fully armed to resist a zero-day attack.