skip to Main Content

More Posts

Signal Sciences Launches Cloud WAF for Easy Web Application Security

Today we are proud to announce the launch of the new Signal Sciences Cloud Web Application Firewall ...

The Ugly Truth of Retail Fraud and Account Takeovers

Human nature can be very ugly to witness, especially when the resulting damage is self-inflicted. Th...

The Reality Reflected by the DevSecOps 2019 Survey Results

The more things change in life, the more they stay the same. A cliche? Perhaps, but that truth is pr...

Testing CVE Mitigation in Web Apps

 

Security Opportunities and Demands of Digital Transformation

As a customer-focused organization, we listen carefully to how organizations are dealing with Digita...

Effectively Discussing Security Risks with the Board

A not so long time ago in a datacenter not so far away, security used to be an afterthought. It was ...

Protecting Business Critical APIs with Proactive Visibility

APIs provide a critical connective tissue between software components and the organizations that rel...

Modern Software Architectures Require Modern Web Security

There’s just no way around it: legacy web application firewalls are struggling to keep up in a lands...

Modern Web Security Meets Modern Load Balancing with NGINX

NGINX Certifies Signal Sciences Dynamic Module DevOps, microservices, hybrid and multi-cloud are fue...

See More, Do More with an AppSec Force Multiplier

  There’s an Effectiveness Scale for security teams: some sit on the “Highly Effective” side, while ...

Preventative Measures to Secure the Healthcare Industry

Each of us are represented by a collection of data. In the healthcare industry, this data includes p...

A Visual Guide to Cloud Native Security Challenges

Security industry reports are great at providing necessary context around complex topics. We read pl...

Making an Impact with Security, DevOps and Cloud Teams

“I’ve written my first security-related blog post, attended my first security conferences, and opene...

The WAF Appliance Struggle is Real in a Cloud Native World

The Trabant, a once popular car in the former Eastern Germany, is emblematic of both inferior techno...

Connect with Signal Sciences on the Road

We know many organizations struggle to implement web application security that works, so we’re looki...

We’re Just Getting Started: $35M Series C to Continue Innovation

They told us the WAF market was destined to remain insignificant—no technology innovations had been ...

Protecting Financial Applications at Scale

Picture this: you’ve found the perfect home, but need financing. You select a lender online and begi...

Visualizing Attack and Signal Trends Across Your Sites

We’re excited to announce the launch of the new overview page for your entire organization. As the c...

Cloud Native Security Challenges and Opportunities

Cloud computing is often the cornerstone of digital transformation efforts, and with the growth of c...

Expanding Power Rules with Shareable Lists

‘Tis the season of cool. Cooler temperatures, cool gifts, and cool holiday sweaters. To stay on them...

CISO Challenges and Security’s New Path with Zane Lackey

Last week, Zane Lackey, CSO / Co-Founder of Signal Sciences and O’Reilly author, sat down with Help ...

7 Ways to Deploy Signal Sciences in Kubernetes

Sports coaches used to rely on paper playbooks to review strategy with their teams. Now, many levera...

Signal Sciences Named a 2018 Gartner Peer Insights Customers’ Choice for Web Application Firewalls

  Signal Sciences is excited to announce that we have been recognized as a 2018 Gartner Peer Insights Customers’ Choice…

A DevSecOps Fireside Chat with Alan Shimel

Recently I sat down with Alan Shimel of DevOps.com and discussed security, DevOps, and how it all fi...

Why Customers Choose Signal Sciences

We ask our customers early and often why they chose us as their next-gen WAF and RASP technology of choice.…

Delivering a better WAF—Faster

At Signal Sciences, we’re in the business of reimagining the WAF and our purpose is to redeem the goal it…

Surfacing Key Indicators of Account Takeovers

  Account takeover (ATO) is a threat to any organization that conducts financial or e-commerce trans...

The Pros and Cons of RASP in 8 Minutes

There are two concerning data points in application security today. First, the Verizon Data Breach I...

Dear RASP: We Need to Talk About the Friction in Our Relationship

Dear RASP, It is finally time for me to write you this letter. When we first met you were something…

Listening to Web Attacks Remixed!

Early last year I published a fun tool called sigsci-sounds for users of Signal Sciences — my prior ...

Moar Platform Support: Signal Sciences is Now Available on Kong Hub for Microservices, API, and Serverless Support

The rise of the API Gateway In the dramatic shift to microservices and APIs to speed up development ...

Security’s Shift Right

Software development has gotten tricky. If you have been in the DevOps game in the past few years, t...

Aggregate Availability Check with Signal Sciences Data

Having the privilege to work with so many great enterprise customers has its benefits. One great benefit is you are…

Auditing Signal Sciences Configuration

Signal Sciences offers tremendous capabilities to defend web applications. I’m not talking just abou...

Using Signal Sciences to Defend Apache Struts CVE-2018-11776

Patching servers is a notoriously difficult problem to address. Software gets out-of-date and new vu...

Introducing go-sigsci: A Go library for the Signal Sciences API

Signal Sciences was built with an API-first design from day one, meaning you can get to all of the d...

Introducing New Product Features: Power Rules and Network Learning Exchange (NLX)

We've just come out of our bi-annual company meeting held at HQ in Culver City, CA and we have excit...

Proactive Update Around the Health of your Signal Sciences Deployment

Signal Sciences Agent Monitoring In your efforts to defend your network and applications, deploying ...

Join Signal Sciences at Black Hat 2018

We are excited to return to one of our favorite conferences, Black Hat 2018, in Vegas, August 7-9! J...

Capturing Request Logs From Signal Sciences

Logs are important. We need them to investigate, monitor, and analyze. In cybersecurity we have many...

Security in the Trenches in Media and Journalism

For the last several years, media organizations have been targets of cyber attacks, making applicati...

New Event Timeline Helps Teams See Detailed Insights Into Blocked Attacks

Here at Signal Sciences, our Product and Technology teams adhere to three core product principles fo...

What the DevSecOps 2018 Survey Results Really Mean for Developers and Security

The 2018 DevSecOps Community Report is out and for those following the growth of DevOps and it’s sub...

Finding More Bugs Won’t Fix AppSec

In the 2018 Verizon Data Breach Investigations Report (DBIR), web applications were the number one s...

Demand More From Your Web Application Firewall

Photo by Kristina Flour on Unsplash I want to let you in on a little secret. About a year ago I had ...

DevOps Notes from the Field

 

Oops, I WAFed my Cache

  It’s annoying when we use acronyms as verbs, isn’t it? I can change, maybe. JIRA me and I will get...

The Importance of Unified Application Security for Your Multi-cloud Strategy

A word from the product marketing and alliances team today!

What’s New in SigSci – RSA 2018 Edition!

RSA is finally here! We had to wait an extra 2 months - remember it was in February last year? Well,...

Meet Signal Sciences at RSA 2018

Signal Sciences is excited to announce we will be at RSA 2018, held at Moscone Center in San Francis...

Three Ways Legacy WAFs Fail

Ah, the WAF. You might know it by its street name: the web application firewall. It’s a long standin...

Team Member Spotlight: Cody Wood

 “A bit over three years ago, I was working as a Plant Operator in the high desert of California…”

Recap: Camp Sig Sci 2018

Two weeks ago was a big one for Signal Sciences. All 80 of our employees were in Culver City for a c...

The Trending Target of Crypto Miners: Your Web Application

At the beginning of every year, the media covering cyber security is hot on predictions for the comi...

DevOps (and DevSecOps) Predictions for 2018

This article originally appeared on devops.com, written by Signal Sciences' James Wickett. [Read an ...

Q&A: CSO Zane Lackey Discusses Industry Highlights, DevOps & Security Trends, and What to Expect in 2018

 

Security is in Crisis and a New Journey Begins

Last month in San Francisco, the DevOps tribe gathered under the umbrella of DevOps Enterprise Summi...

DevOps and Security in Practice at Chef – A Case Study

Chef’s mission is to help transformative companies become fast, efficient, and innovative software-d...

Signal Sciences at AWS re:Invent 2017 Announcing New AWS Marketplace Listing

We are excited to be sponsoring this year’s AWS re:Invent in Las Vegas, November 27-Dec 1. We’re the...

Embedding Web Application Security Into Retail DevOps – A Case Study

According to the 2017 Verizon Data Breach Report, the Retail and Accommodation industries combined a...

Signal Sciences has a new HQ

Signal Sciences is thrilled to announce we have moved to new headquarters in Culver City’s stunning ...

Signal Sciences at SpringOne Platform 2017

Signal Sciences is proud to be presenting at this year’s SpringOne Platform conference in San Franci...

DevOps School is now in Session!

Over the last 12 months, I (James Wickett) have been working on a really exciting project to help ma...

Signal Sciences WPP Provides the Broadest Language Support; Adds New Language to RASP Module

  Application security needs to work with developers – or get left behind. To facilitate this alignm...

RASP Value Is Security Coverage

As an former engineer, I am biased towards getting excited around toys that blink, light up, and are...

Signal Sciences Joins Splunk Adaptive Response Initiative

From alerts to actions: Signal Sciences Joins Splunk Adaptive Response Initiative to bring powerful ...

What Can We Learn from the Equifax Breach?

Here we go again. Another massive data breach has exposesd extremely sensitive personal information,...

Go Development Tools for Testing and Hot Reloading

Those new to the Go language (golang) often are excited about the simplicity, speed and portability ...

Securing Microservices and APIs with NGINX and Signal Sciences

A shift is happening in the tech industry: monolithic web applications are being decomposed into mic...

Starting the Avalanche: Application DoS In Microservice Architectures

This upcoming Modern Security Episode will introduce you to one of the most devastating ways to caus...

Detect and Defend Account Takeovers

The storyline is a familiar one — millions of accounts compromised, data leaked to the internet, sol...

Practical Tips for Defending Web Applications In The Age Of DevOps

We are excited to announce an encore presentation by Zane Lackey, CSO of Signal Sciences, of his tal...

0 to 100 mph: Accelerating Visibility for Application Security

In a drag race, how quickly you get off the line sets the tone for the race. From there it is all ab...

Business Logic Flaws

  Protect Your Unique Snowflake from the Dark Side  I haven’t always been a “business” guy. As a mat...

Meet Signal Sciences this Summer during Black Hat / Def Con!

Signal Sciences is thrilled to participate in this month’s upcoming Black Hat and Def Con festivitie...

Why Rugged Matters in the Dev, Sec, and Ops Discussion

Last week we discussed how security and continuous delivery can be traveling companions, this week I...

Traveling Companions: Continuous Delivery and Security

Security and Continuous Delivery. They are unlikely friends because security has historically taken ...

Meet Cool Vendor Signal Sciences at the Gartner Security & Risk Management Summit 2017

  Attending the event? Visit us in Booth #240

‘Security is not a Binary Event’ and other Truisms of Modern Security

  Off. On. Hacked. Not hacked. Safe. Vulnerable. It is easy to think in these terms because it allow...

How to get started with PaaS in Heroku, IBM Bluemix, and Pivotal

If you work in Information Technology, there is no doubt you are well aware of the shift to the clou...

Team Member Spotlight: Andrea Swaney

Andrea Swaney, Director of Sales, has been at the helm of Signal Sciences’ sales team since before i...

Executive Spotlight: Stephen Gomann, Vice President of Sales, and Randy Paulk, Vice President of Sales Engineering

Signal Sciences welcomes two industry leaders, Stephen Gomann, VP Sales, and Randy Paulk, VP Sales E...

Key Takeaways From The Major Media Security Summit

Due to rapid technology advancements and the evolution of platforms, security in the media industry ...

Considering RASP and Modern Application Security Defense

Are you considering RASP? Certainly many enterprises large and small are so you aren’t alone. Having...

Web Application Security: The New Way Forward

The Web Application Firewall (WAF). It’s tech that never really was. That statement might upset some...

About Signal Sciences Labs

Signal Sciences Labs is the research and tech behind Signal Sciences and their Next-Gen Web Applicat...

What’s in a Name? RASP Smells like a Rose

“What’s in a name? That which we call a rose by any other name would smell as sweet.” -William Shake...

System Clock Skewed? Read this Post, Especially if You Don’t Have Time

“Time keeps on slippin’ slippin’ slippin’, into the future” -“Fly Like An Eagle”, The Steve Miller B...

DevSecOps: Embracing Automation, Letting Go of Tradition

I am all for traditions like Thanksgiving turkey and Sunday afternoon football, but holding onto tra...

Six Reasons App Security Defense Doesn’t Belong at the Edge

CDNs (content delivery networks) were a great invention. They put pieces of content at the edge of t...

AppSec Program for Startups with Neil Matatall

We are excited to announce our next Modern Security Series episode. This episode is for anyone that ...

Thanks for making RSA 2017 a huge success

This year there were 43,000 people in attendance at what is the largest security convention of the y...

Why Logs aren’t Enough for Security

Logs. We love them. We hate them. We can’t collect enough of them. We collect too many. We save them...

Meet Signal Sciences At RSA 2017!

Signal Sciences is excited to announce that we are participating in 2017’s upcoming RSA Conference, ...

Thanks for Joining us at AppSec California

Signal Sciences participated in another wonderful year at one of our favorite (and only) beach front...

Deploy Secure Apps With Signal Sciences and Pivotal

Expanding customer support for the modern web, Signal Sciences today announced the availability of o...

DevOops: Redux – Modern Security Series

DevOps toolchains are transforming Modern IT, but hackers can undermine their benefits through poorl...

Using Signal Sciences with Kubernetes

One of the questions I hear regularly from customers is how to include Signal Sciences with some of ...

AppSec California Happy Hour

  Signal Sciences is joining forces with BugCrowd at AppSec California 2017. 

Listening To Web Attacks

Note: this tool has been updated from the details below. Read the updated 2018 information on sigsci...
Back To Top