• By HT Bridge   -   Jul 19, 2018

    SECURITY MISCONFIGURATION, A CONSCIOUS ELEMENT OF OWASP TOP 10, THE RISKS AND SOLUTIONS

    Security Misconfiguration is 6 in the current OWASP Top Ten Most Critical Web Application Security Risks. Misconfiguration can include...

  • By HT Bridge   -   Jul 17, 2018

    HIGH-TECH BRIDGE JOINS THE BRITISH-SWISS CHAMBER OF COMMERCE

    The BSCC membership will facilitate business growth and the sustainable expansion of ImmuniWeb® AI award-winning technology to the...

    Tech
  • By HT Bridge   -   Jul 12, 2018

    OWASP TOP 10: BROKEN ACCESS CONTROL, THE RISKS AND SOLUTIONS

    Broken Access Control is 5 in the current OWASP Top Ten Most Critical Web Application Security Risks. It should be viewed in conjunction...

  • By HT Bridge   -   Jul 6, 2018

    XML EXTERNAL ENTITIES : THE THREAT OF AND SOLUTION

    XML External Entities is 4 in the current OWASP Top Ten Most Critical Web Application Security Risks.

  • By HT Bridge   -   Jun 28, 2018

    OWASP'S 3 WEB APPLICATION RISK - THE THREAT OF AND SOLUTION TO SENSITIVE DATA EXPOSURE

    Sensitive data exposure is 3 in the current OWASP top Ten Most Critical Web Application Security Risks.

  • By HT Bridge   -   Jun 26, 2018

    HTTP SECURITY HEADERS - HOW TO IMPROVE YOUR WEB APPLICATION OVERALL SECURITY WITH JUST A FEW STEPS

    HTTP Security Headers were created to protect applications from frequent and common attacks without the need to add or change the code...

  • By HT Bridge   -   Jun 21, 2018

    OWASP'S 2 WEB APPLICATION RISK - THE THREAT OF AND SOLUTION TO BROKEN AUTHENTICATION

    User authentication - the process of ensuring only authorized users have access to controlled data and functionality - is the fundamental...

  • By HT Bridge   -   Jun 14, 2018

    OWASP'S 1 WEB APPLICATION RISK - THE THREAT OF AND SOLUTION TO WEB APPLICATION INJECTION ATTACKS

    Toward the end of 2015, UK broadband provider TalkTalk was hacked by a 17-year old youth. The method he used was SQL injection attack...

  • By HT Bridge   -   Jun 13, 2018

    HIGH-TECH BRIDGE LAUNCHES VAR PARTNERSHIP PROGRAM FOR IMMUNIWEB® AI

    The program enables MSSPs, IT security distributors, integrators and consultants to integrate ImmuniWeb® into their offering and expand...

    Tech
  • By HT Bridge   -   Jun 6, 2018

    HIGH-TECH BRIDGE IS THE WINNER OF SC AWARDS EUROPE 2018

    High-Tech Bridge's ImmuniWeb® named the Winner in “Best usage of Machine Learning / AI” category at SC Awards Europe 2018.

    Tech
  • By HT Bridge   -   May 24, 2018

    DR. JEAN-MARC RICKLI ABOUT THE FUTURE OF AI

    Dr. Jean-Marc Rickli, Head of Global Risks and Resilience at GCSP, explains the future of AI, related risks and opportunities.

  • By HT Bridge   -   May 11, 2018

    ROBIN WILTON ABOUT GDRP COMPLIANCE, AI AND IOT CHALLENGES

    Robin Wilton, Technical Director for Identity and Privacy at the Internet Society, provides expert opinion on the hottest cybersecurity,...

  • By HT Bridge   -   May 8, 2018

    HOW TO PROTECT YOUR WEB APPLICATIONS FROM XXE ATTACKS

    XML External Entities Attacks are now the 4th greatest risk to web applications as per OWAPS Top 10.

  • By HT Bridge   -   May 3, 2018

    BASIC STEPS FOR API SECURITY

    Security of microservices and APIs: the Achilles' heel of modern web applications.

  • By HT Bridge   -   May 1, 2018

    HOW CAN APPLICATION DEVELOPERS BUILD SECURE AND RELIABLE CODE? OWASP TOP 10 PROACTIVE CONTROLS - PART 2

    What application developers should know about secure coding and proactive security? Improve the security of your applications from...

  • By HT Bridge   -   Apr 27, 2018

    BGP/DNS COMBO NETS HACKERS THOUSANDS IN ETHEREUM

    Unusual BGP/DNS attack sees ETH users scammed, while it emerges that hacked exchange Coincheck made a fortune just before major security...

  • By HT Bridge   -   Apr 26, 2018

    WHAT APPLICATION DEVELOPERS SHOULD KNOW ABOUT SECURE CODING AND PROACTIVE SECURITY? PART 1

    How to effectively teach your developers about Secure Coding? Find more about it below.

  • By HT Bridge   -   Apr 25, 2018

    FIRST CASE OF X-RAY MALWARE REVEALED?

    Security nightmare as new attack campaign targets healthcare providers - and even high-end medical scanning machines...

  • By HT Bridge   -   Apr 24, 2018

    DEVSECOPS - INTEGRATING SECURITY IN THE DEVELOPMENT PROCESS

    What are the practical benefits of DevSecOps in application security and how can organizations leverage them?

  • By HT Bridge   -   Apr 19, 2018

    ALL APPLICATIONS ARE VULNERABLE, CLAIMS SHOCK SECURITY REPORT

    Downright frightening figures on web application vulnerabilities paint damning picture of security trends.