Supercomputer SONM partners with Hacken for security audit

Decentralized fog-computing platform SONM today announced that it has forged a partnership with Hacken, a group of enterprises created to maintain links between blockchain and cybersecurity communities, the promotion of hacker ethics and the encouragement of legitimate research on computer networks and software.

Simply put, Hacken is a community of white hat hackers who promote a positive culture of hacking, which doesn’t harm but rather helps projects improve cybersecurity. Hacken will help SONM to exclude vulnerabilities in its network and make it safe and reliable.

“A secure environment for user applications is the chief priority for our platform. For that reason I support this project, which is helping us to build that environment and give us the professional knowledge that we need,” said Alexei Antonov, co-founder of SONM.

“What I like about Hacken is that they position themselves as a marketplace where hackers (in the positive sense of the term) can meet security service consumers, and for the blockchain arena the availability of projects that can be launched at a moment’s notice is very important, and with RnD projects this is very rare,” he said.

The security audit process, as well as vulnerabilities uncovered, will be fixed in time and published with the use of a blockchain proof of vulnerability and preventative measures recommended by HackenProof. The certificate is unique for each project.

“Cyber threats are an extremely complex problem that is becoming more and more relevant with each passing year. In 2018 alone cybercriminals have stolen more than $2 billion in the course of attacks on all kinds of companies and services,” said Dmitry Budorin, senior manager and financial director of Hacken.

“For this reason, we believe that in the present conditions information security is one of the most important factors in the successful work of any company. We are delighted to collaborate with SONM, and as part of this we will help our partners to test their system for penetrations and identify vulnerabilities that intruders can use in their interests,” said Budorin.

Exit mobile version