Ilia Kolochenko

Want to Join?
Opinions expressed by ICN authors are their own.

Ilia Kolochenko has a BS degree with honors in Mathematics and Computer Science from Geneva - the city where he grew up. Ilia started his career as a penetration tester working for financial institutions and large companies in Switzerland and abroad. His military service in Swiss artillery troops took place in Frauenfeld, Bière and Visp.

At the end of 2007, Ilia started his own company High-Tech Bridge, aiming to deliver efficient and effective cybersecurity to companies of all sizes.

Being web application security expert and chief architect of High-Tech Bridge's award-winning web security platform ImmuniWeb, Ilia is also personally involved into daily technical operations.

Ilia is a contributing writer for SC Magazine UK and Dark Reading, he is regularly quoted in various infosecurity and business journals, he was interviewed by Forbes, CNBC, WSJ, Financial Times, and BBC.

He most recently was selected to the Forbes Technology Council.

The opinions expressed in this blog are those of Ilia Kolochenko and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Newly elected French president raises questions in trying to dupe hackers

How CISOs can overcome cybersecurity pollution

How CISOs can overcome cybersecurity pollution

How to assess a cybersecurity vendor in simple, unbiased and efficient manner?

RSAC 2017: The end of easy cash bounties

RSAC 2017: The end of easy cash bounties

Industry evolution eliminates chances of bug hunters to get easy cash for trivial vulnerabilities.

Ransomware 2.0: Anatomy of an emerging multibillion business

Ransomware 2.0: Anatomy of an emerging multibillion business

What to expect from and how to resist the fastest growing sector of cybercrime in 2017?

Shall we care about zero-day?

Shall we care about zero-day?

Gartner says that 99% of exploited vulnerabilities are publicly known. Does it mean we can ignore zero-days?

Name and shame cybersecurity: a gift for cybercriminals?

Name and shame cybersecurity: a gift for cybercriminals?

Cybersecurity “name and shame” practice may significantly boost global cybercrime.

Cybersecurity: is it really a question of when, not if?

Cybersecurity: is it really a question of when, not if?

Can you imagine your banker saying “it’s not a question of if I lose your money, but when will I lose your money”?

Fake attacks by insiders to fool companies

Fake attacks by insiders to fool companies

Famous cybercrime groups and hacktivists “brands” may be a smokescreen to cover sophisticated insider attacks.

Can crowd security testing be cost efficient for web apps?

Can crowd security testing be cost efficient for web apps?

Can Bug Bounty programs be a cost-efficient complement for security testing of modern web applications?

Infosec16: keep your cybersecurity strategy simple to win

Infosec16: keep your cybersecurity strategy simple to win

Infosecurity Europe 2016 highlighted a great variety of emerging cybersecurity threats. Keeping things simple can help CISOs a lot.

Web application security risks: Accept, avoid, mitigate or transfer?

Web application security risks: Accept, avoid, mitigate or transfer?

Web application security is a very hot topic these days. What shall CISOs do with the related risks?

Five most common myths about Web security

Five most common myths about Web security

Running behind trendy APTs we tend to forget about common-sense approach and holistic risk assessment.

Load More