Latest Security Advisories
News and press releases
High-Tech Bridge Security Blog
Being a large company, you have a risk when hiring a third-party consultant - you condemn them to be hacked instead of you.
How efficiently do the Global 2000 companies protect our data between their web servers and our computers or mobiles?
Growing DDoS attacks more and more frequently try to distract incident response teams in order to hide much bigger security incidents.
How to secure connected devices before it will be too late?
In June 2015 The Forum of Incident Response and Security Teams (FIRST) has announced the availability of version 3 of the Common Vulnerability Scoring System (CVSS). Let's see the changes it brings in comparison to CVSSv2.
One of the recent web application security researches by Gartner mentioned a blind XSS vulnerability, highlighting the importance of web security software to detect such security flaws. Many of us have heard about blind SQL injections, but what is a blind XSS?
Nowadays security companies have to compete not only with other vendors, but also with sophisticated cyber gangs. If you will fail to detect and patch security vulnerabilities in a timely manner – Black Hats will do it for you, but for their own ends.
In this short blog post we will try to understand in quick and simple manner the difference between SAST and DAST testing methodologies, their advantages and disadvantages, as well as utility to combine them from the business point of view.
There hasn’t been a day in recent months when the term “Advanced Persistence Threat” wasn’t making headlines in the media. According to ISACA APT Awareness Study, 93.6 per cent of respondents consider APTs to be a “very serious threat” for their companies.
What is the relation between growing security spending, increasing hacking attacks and falling economy?