San Francisco: +1 (415) 635 3784  |  Geneva: +41 (22) 723 2424   |  
ImmuniWeb®: Login | Register
ImmuniWeb® by High-Tech Bridge

Stay in touch

Enter your email and get the latest news and researches on cybersecurity, receive invitations to private security events and conferences.

High-Tech Bridge Security Blog

MIT: the future of cybersecurity belongs to hybrid of human brain and machine power April 22, 2016 | High-Tech Bridge Security Research

MIT project confirms that neither human nor machine has proven overwhelmingly successful at maintaining cybersecurity on their own.


Cybersecurity spending: more does not necessarily mean better April 18, 2016 | Ilia Kolochenko for CSO

Cybersecurity is not something you can just buy, but something you should thoroughly build.


Why PCI DSS cannot replace common sense and holistic risk assessment March 29, 2016 | Ilia Kolochenko for CSO

Cybersecurity compliance is not designed to eliminate data breaches or stop cybercrime.


Web Application Firewall: a must-have security control or an outdated technology? March 10, 2016 | Ilia Kolochenko for CSO

Can a Web Application Firewall be an efficient security control for modern web applications?


90% of SSL VPNs use insecure or outdated encryption, putting your data at risk February 23, 2016 | High-Tech Bridge Security Research

Have you ever thought how secure and reliable your SSL VPN? Probably you should.


Five rules to conduct a successful cybersecurity RFP February 15, 2016 | Ilia Kolochenko for CSO

Five simple RFP rules to get the best price/quality ratio when buying cybersecurity products and services.


Google increase awareness of email TLS encryption February 10, 2016 | High-Tech Bridge Security Research

Gmail users will now be able to see if a remote SMTP server has TLS encryption enabled.


Patching Complex Web Vulnerabilities Using ModSecurity WAF February 9, 2016 | High-Tech Bridge Security Research

In this blog post we will demonstrate complicated examples of common web application vulnerabilities, and see how they can be mitigated with ModSecurity WAF.


Bypassing Bitrix WAF via tiny regexp error February 3, 2016 | High-Tech Bridge Security Research

Bitrix24 is one of the first and most secure cross-platform corporate software with integrated WAF and RASP. Let's see how we can bypass them.


Facebook scandal or can bug bounties replace traditional web security? January 11, 2016 | Ilia Kolochenko for CSO

Can crowd-sourcing approach to web security testing work for your corporate applications?