We are the part of the holding

Compliance and Regulations for Secure POS Development

Point-of-sale software has become a must-have item for every retail business, restaurant, or safe. Up-to-date sales solutions have gone further than just processing payments, as they now structure and automate the whole cycle of your supply chain. And with custom POS development, your opportunities to create self-sufficient and powerful solutions are limitless.  At the same...

  • 9-10 min read
  • December 17, 2021
  • by Olha Didenko

Security in Сustom Mobile Application Development

Mobile devices have become more popular than laptops. No wonder – they are always in our hands and allow us to engage in so many activities on the go. We have mobile applications for everything – online shopping, entertainment, communication with friends, bank operation, and even work. According to recent research, people in the US...

  • 14-15 min read
  • November 16, 2021
  • by Anna

Нow to Secure the Internet of Things from Cyberthreats

The Internet of Things brings us closer to the exciting parts and aspects of cyberpunk movies. Anyone can now be the person who turns on the coffee maker remotely with one press of the button, then puts on a smartwatch to check their heart rate, and then drives to work when the office is managed...

  • 11-12 min read
  • October 11, 2021
  • by Olha Didenko

10 Steps to Create a Secure IT Environment

Do you think that your company is secured enough to resist the possible onslaught of cyberattacks?  Unfortunately, the significance of this question has only been growing over time. Every year thousands of businesses and other institutions encounter cyberattacks. The headlines on another data leak from Facebook constantly appear in our news feeds. Pandemic also played...

  • 12-13 min read
  • August 02, 2021
  • by Olha Didenko

Best practices of secure solution development [Tips]

Based on our experience, we can say for sure that digital business transformation has been picking up significant momentum during the last 3 years. Companies of all sizes from all over the world are eager to invest in their own custom solutions to be one step ahead of all their competitors, to work more efficiently...

  • 14-15 min read
  • June 03, 2021
  • by Anna

Fraud prevention platform Sift raises $50M at over $1B valuations

In the past year, we’ve seen a surge in online activity due to telecommuting.  Growing activity, including transactions, hello to the fact that cybercriminals also wanted to benefit from this. The maximum amount of criminal activity manifested itself in personal and corporate data leakage, credit card fraud, phishing, etc. The rise in crime is not...

  • 2-3 min read
  • April 23, 2021
  • by Ksenija

WhatsApp Has Fixed Previously Discovered Vulnerabilities in Its System

WhatsApp released six previously undisclosed vulnerabilities that were quickly fixed. The vulnerabilities have been reported on a dedicated security advisory website that will be used to post news about WhatsApp updates and emerging vulnerabilities in the future. According to company representatives, five of the six vulnerabilities were fixed on the same day, and the last...

  • 2-3 min read
  • September 04, 2020
  • by Ksenija

How can we help you?

  • Indicating scope, timeframes, or business challenges would allow us to provide a better response
  • Our expert team will get back to you within 24h for free consultation
  • All information provided is kept confidential and under NDA

Looking forward to your message!

GBKSOFT
spinner