More Posts
Integrating the Ambassador Edge Stack with the Signal Sciences Web Application Firewall
With a new integration between the Ambassador Edge Stack, the most popular Kubernetes-native API gateway and Signal Sciences WAF, platform teams can now further…
- by Jen Dyment
Sick of high WAF costs?
So are we.
A rapidly growing theme for essentially every CISO I’ve been speaking with these days is: how do we get more…
Signal Sciences Introduces Advanced Rate Limiting for Fast, Easy Protection Against Advanced Web Attacks
Signal Sciences is excited to announce the availability of new advanced rate limiting features that extend our customers' ability to…
My Top Five Cyber Security Books
Over the last two years, I’ve read 25+ cyber security books to invest in understanding as many parts of our…
Web Application Security Without Organizational Resistance
As software-defined networks have replaced the monolithic, server-to-server communication paths of networks’ past, web application firewalls (WAFs) have become staples…
How Next-Gen WAF Empowers the DevOps Lifecycle
Signal Sciences next-gen WAF can send and receive data to and from a wide range of security and DevOps tools…
Preventing Server Side Request Forgery (SSRF)
Reflecting on the use of SSRF in the Capital One Breach One of the most notable breaches of 2019 was…
- by Alfred Chung
Application Layer Protection for Istio Service Mesh
Today, Signal Sciences announced another industry-first: the launch of our next-gen WAF integration with Istio service mesh. As development teams…
- by Alfred Chung
Protecting WebSocket Protocol Apps and APIs with Signal Sciences
The 4.2 release of the Signal Sciences agent introduces WebSocket traffic inspection, enabling customers to extend the coverage of applications,…
- by Alfred Chung
Security is a Shared Responsibility
One of the core tenets of National Cybersecurity Awareness Month this year is “Secure It.” But what is “it” exactly?…
Championing Visibility and Reducing Uncertainty with Effective Product Design
HTTP Request Smuggling Detections
I’m excited to announce the ability of Signal Sciences to detect HTTP Request Smuggling attempts! For customers implementing modern, multi-tiered…
- by Brian Joe
Protecting Valuable Personal Health Information (PHI)
There’s no way around it: medical care impacts us all. Even in good health, we cannot predict accidents and emergency…
The 3-Layered Cake: Deploying Signal Sciences in Kubernetes
Examples of common install patterns of Signal Sciences in Kubernetes The Many Flavors of Kubernetes Recently I have found that…
Strengthening Your Defenses Against API Abuse
Application Programming Interfaces (APIs) are an intermediary framework that enable applications to communicate and exchange data with one another. As…
- by Liz Hurder
Keep Doing What You’re Doing!
I got this follow up text from a CISO I had dinner with last night and it’s a fitting message…
Virtual Patching the Signal Sciences Way
Virtual Patches: Security Duct Tape Let’s get serious for a minute. Virtual Patching is Cyber duct tape. Originally coined by…
- by Cody Wood
Real-time Web Layer Threat Investigation and Remediation with Cisco Threat Response
- by Tom Chang
Signal Sciences Launches Next-Gen WAF Support for Envoy
Signal Sciences Launches Cloud WAF for Easy Web Application Security
The Ugly Truth of Retail Fraud and Account Takeovers
Modern Software Architectures Require Modern Web Security
Modern Web Security Meets Modern Load Balancing with NGINX
A Visual Guide to Cloud Native Security Challenges
The WAF Appliance Struggle is Real in a Cloud Native World
Protecting Financial Applications at Scale
Visualizing Attack and Signal Trends Across Your Sites
Cloud Native Security Challenges and Opportunities
Expanding Power Rules with Shareable Lists
Seven Ways to Deploy Signal Sciences in Kubernetes
Why Customers Choose Signal Sciences
We ask our customers early and often why they chose us as their next-gen WAF and RASP technology of choice.…
Delivering a better WAF—Faster
At Signal Sciences, we’re in the business of reimagining the WAF and our purpose is to redeem the goal it…
Surfacing Key Indicators of Account Takeovers
The Pros and Cons of RASP in 8 Minutes
Dear RASP: We Need to Talk About the Friction in Our Relationship
Dear RASP, It is finally time for me to write you this letter. When we first met you were something…
Listening to Web Attacks Remixed!
Moar Platform Support: Signal Sciences is Now Available on Kong Hub for Microservices, API, and Serverless Support
Security’s Shift Right
Aggregate Availability Check with Signal Sciences Data
Having the privilege to work with so many great enterprise customers has its benefits. One great benefit is you are…
Auditing Signal Sciences Configuration
Introducing go-sigsci: A Go library for the Signal Sciences API
- by Shawn Smith
Introducing New Product Features: Power Rules and Network Learning Exchange (NLX)
Proactive Update Around the Health of your Signal Sciences Deployment
New Event Timeline Helps Teams See Detailed Insights Into Blocked Attacks
Three Ways Legacy WAFs Fail
RASP Value Is Security Coverage
Go Development Tools for Testing and Hot Reloading
Securing Microservices and APIs with NGINX and Signal Sciences
0 to 100 mph: Accelerating Visibility for Application Security
Business Logic Flaws
‘Security is not a Binary Event’ and other Truisms of Modern Security
Web Application Security: The New Way Forward
About Signal Sciences Labs
System Clock Skewed? Read this Post, Especially if You Don’t Have Time
Why Logs aren’t Enough for Security
Using Signal Sciences with Kubernetes
Listening To Web Attacks
Getting Started With HoneyPy — Part 3
Getting Started With HoneyPy — Part 2
Getting Started With HoneyPy — Part 1
Understand Your Risk with Data
Hacking the Hard Way at the DerbyCon CTF
How to Setup Vim for Golang Development
Introduction to HoneyPy & HoneyDB
What is the Difference Between NGWAF, WAF, and RASP?
Avoiding the Dystopian Road in Software
The Next Frontier of DevOps: Security
Classy up your curl with curl-trace
More Silo Smashing Ideas, bringing InfoSec and DevOps together
Silo Smashing and Feedback Loop Amplification
InfoSec Confession: We protect the wrong things and we slow everything down
Why DevOps and Product Teams Hate Web Application Firewalls
- by Max Anderson