News and press releases
High-Tech Bridge Security Blog
MIT project confirms that neither human nor machine has proven overwhelmingly successful at maintaining cybersecurity on their own.
Cybersecurity is not something you can just buy, but something you should thoroughly build.
Cybersecurity compliance is not designed to eliminate data breaches or stop cybercrime.
Can a Web Application Firewall be an efficient security control for modern web applications?
Have you ever thought how secure and reliable your SSL VPN? Probably you should.
Five simple RFP rules to get the best price/quality ratio when buying cybersecurity products and services.
Gmail users will now be able to see if a remote SMTP server has TLS encryption enabled.
In this blog post we will demonstrate complicated examples of common web application vulnerabilities, and see how they can be mitigated with ModSecurity WAF.
Bitrix24 is one of the first and most secure cross-platform corporate software with integrated WAF and RASP. Let's see how we can bypass them.
Can crowd-sourcing approach to web security testing work for your corporate applications?