To be the ultimate software provider, you have to be willing to meet all aspects of your customers’ needs. This is why in addition to developing software, SPG offer vital information security audits of both infrastructure and software, arm businesses with an effective action plan and help companies to resolve any newfound underlying issues. Get in touch if your company requires assessment, development or testing services!
Oh, and by the way: we’re attending two major cybersecurity events in London — Infosecurity Europe, from the 4th-6th of June, and IFSEC, between June 18th-20th — and would be more than willing to meet you there and discuss your security requirements.
In the meantime, however, please enjoy the article below about the various steps that Software Planet Group are already taking today to keep all of our developers on top of the latest tech trends:
According to a recent report by the British government, between 2018 and 2019, around 36 percent of UK-based businesses were victims of an instance of a cyber breach or attack. While this may not seem like a terribly alarming statistic, not only is the number higher for medium and larger businesses (60 percent), but it can also cost companies up to $29,000 per year (£23,000).
With this in mind, at Software Planet, in addition to developing our knowledge of the latest tech trends, we believe it is imperative to keep up with cybersecurity, and prepare our team of developers for any possible future attacks.
We do this in a variety of different ways, including playing host to regular Tech Talks and attending a plethora of professional training events — the most recent of which was NoNameCon in Ukraine.
Information Security Workshops
At the Lavra Art Gallery in Kiev (or Kyiv, as locals would prefer it to be known), the 4-day conference kicked off on the 14th of May, and SPG were on site to soak in the wisdom.
Our developers participated in a number of different workshops, like “How to Improve Your Online Privacy,” “Security Threats with Kubernetes,” and even an insightful lecture on vulnerabilities in connected cars.
What we did not expect, however, was just how fun and demanding these workshops would turn out to be.
Playing Detective
One information security workshop in particular, “Hunting Fileless Malware,” was especially intriguing, as attendees were required to hack a Windows-based workstation. The real reason behind the activity, however, was not to engage in criminal behaviour — shock horror! — but to spot the hidden clues left by each self-inflicted breach, and hunt down malicious code with Windows Sysinternals and forensics tools.
Smart Badges
Another challenging aspect of the event was the clever use of smart badges. Essentially, these consisted of a straightforward ESP32 board, 10 LED lights and a few touch-sensitive buttons, but the competition they engendered was like something out of Game of Thrones.
After all, it was every developer’s fantasy! Each badge came with its own firmware containing six very puzzling security tasks, which everyone in attendance was then expected to solve. And though instead of an iron throne, the winner would only be given bragging rights, out of 400 developers in attendance, our team were in the top 25.
In fact, we made our way to the very top of the pack, as with six full hours to go, it was Igor Ostapenko who delivered the final blow.
Information Security at Full Steam Ahead!
As encouraging as these results may be, given the constant threat to our customers’ online security, SPG are determined to continue to improve our skills.
This is why in June, we will be in London attending two more information security events — InfoSecurity Europe and IFSEC International — and we cannot wait to see what our developers will be able to achieve.
On that note, by the way, if you are interested in joining us for any upcoming conferences, do not hesitate to let us know and we’ll be happy to meet at the show!
Just remember to first introduce yourself, or we’ll be forced to reply to “NoNameJohn” ;-).
See more about trends in software development
Cryptominer Alert: A lab environment built for learning was hijacked for cryptocurrency mining. Vulnerability, detection methods, and key takeaways.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.