skip to Main Content

More Posts

Join Signal Sciences at AWS re:Invent 2019!

Signal Sciences returns as a Gold Sponsor for AWS re:Invent from Dec. 2-5 in Las Vegas where 65,000 attendees will…

The Impact and Tactics of Retail E-commerce Web Attacks

The online shopping season is upon us as consumers search the web for the best deals on gifts. The revenue…

Protecting WebSocket Protocol Apps and APIs with Signal Sciences

The 4.2 release of the Signal Sciences agent introduces WebSocket traffic inspection, enabling customers to extend the coverage of applications,…

Better Web Shell Detections with Signal Sciences Next-gen WAF

Note: Special thanks to Alec Randazzo and Expel who originally wrote and published this blog. We're showcasing it as it…

Keeping Digital Information Safe with SOC2 and HIPAA

Signal Sciences is proud to announce that it has achieved Service Organization Control (SOC) 2 Type 2 and Health Insurance…

Security is a Shared Responsibility

One of the core tenets of National Cybersecurity Awareness Month this year is “Secure It.” But what is “it” exactly?…

Web Layer Visibility Defined: Identifying Top Web Attack Indicators

With the flu season coming upon us, we’re lucky that its signs and symptoms—aches, congestion, and fever—are easily recognized within…

Increasing Security Visibility with Multiple Custom Dashboards

At Signal Sciences, one of our guiding principles it to make security visible. That means empowering our customers to know…

Signal Sciences Launches Pivotal Container Service (PKS) Integration

Container adoption has grown rapidly in recent years: Gartner Research predicts that by 2022 more than 75% of organizations globally…

Three Key Challenges for Securing Cloud-Native Apps: Lessons learned from Cloud Native Security Summit 2019

Signal Sciences, along with Capsule8 and Obsidian Security, recently hosted the 2nd annual Cloud Native Security Summit (CNSS), bringing together…

Signal Sciences is the leading Visionary in the 2019 Gartner Magic Quadrant for Web Application Firewalls

In recognition of the massive innovation Signal Sciences has brought to the protection of web applications, APIs, and microservices, we’ve…

Championing Visibility and Reducing Uncertainty with Effective Product Design

Sean Dillingham, Director of Product Design at Signal Sciences, has a mission: to make the best appl...

HTTP Request Smuggling Detections

I’m excited to announce the ability of Signal Sciences to detect HTTP Request Smuggling attempts! For customers implementing modern, multi-tiered…

Protecting Valuable Personal Health Information (PHI)

There’s no way around it: medical care impacts us all. Even in good health, we cannot predict accidents and emergency…

The 3-Layered Cake: Deploying Signal Sciences in Kubernetes

Examples of common install patterns of Signal Sciences in Kubernetes The Many Flavors of Kubernetes Recently I have found that…

Join Signal Sciences at Black Hat 2019!

Signal Sciences returns as a Gold Sponsor for the 22nd edition of Black Hat from August 7-8 at the Mandalay…

Strengthening Your Defenses Against API Abuse

Application Programming Interfaces (APIs) are an intermediary framework that enable applications to communicate and exchange data with one another. As…

Keep Doing What You’re Doing!

I got this follow up text from a CISO I had dinner with last night and it’s a fitting message…

Securing Technology Innovators’ Web Layer Assets

Move Fast Without Breaking Things For the last fifteen years, Facebook’s motto “Move Fast and Break Things” has been the…

Virtual Patching the Signal Sciences Way

Virtual Patches: Security Duct Tape Let’s get serious for a minute. Virtual Patching is Cyber duct tape. Originally coined by…

Real-time Web Layer Threat Investigation and Remediation with Cisco Threat Response

The Challenge of Limited Web Layer Attack Visibility Over the past decade we’ve seen companies of al...

Signal Sciences Launches Next-Gen WAF Support for Envoy

Today we’re excited to announce that we’ve broadened our integrations by supporting Envoy in limited...

Signal Sciences Launches Cloud WAF for Easy Web Application Security

Today we are proud to announce the launch of the new Signal Sciences Cloud Web Application Firewall ...

The Ugly Truth of Retail Fraud and Account Takeovers

Human nature can be very ugly to witness, especially when the resulting damage is self-inflicted. Th...

The Reality Reflected by the DevSecOps 2019 Survey Results

The more things change in life, the more they stay the same. A cliche? Perhaps, but that truth is pr...

Testing CVE Mitigation in Web Apps

 

Security Opportunities and Demands of Digital Transformation

As a customer-focused organization, we listen carefully to how organizations are dealing with Digita...

Effectively Discussing Security Risks with the Board

A not so long time ago in a datacenter not so far away, security used to be an afterthought. It was ...

Protecting Business Critical APIs with Proactive Visibility

APIs provide a critical connective tissue between software components and the organizations that rel...

Modern Software Architectures Require Modern Web Security

There’s just no way around it: legacy web application firewalls are struggling to keep up in a lands...

Modern Web Security Meets Modern Load Balancing with NGINX

NGINX Certifies Signal Sciences Dynamic Module DevOps, microservices, hybrid and multi-cloud are fue...

See More, Do More with an AppSec Force Multiplier

  There’s an Effectiveness Scale for security teams: some sit on the “Highly Effective” side, while ...

Preventative Measures to Secure the Healthcare Industry

Each of us are represented by a collection of data. In the healthcare industry, this data includes p...

A Visual Guide to Cloud Native Security Challenges

Security industry reports are great at providing necessary context around complex topics. We read pl...

Making an Impact with Security, DevOps and Cloud Teams

“I’ve written my first security-related blog post, attended my first security conferences, and opene...

The WAF Appliance Struggle is Real in a Cloud Native World

The Trabant, a once popular car in the former Eastern Germany, is emblematic of both inferior techno...

Connect with Signal Sciences on the Road

We know many organizations struggle to implement web application security that works, so we’re looki...

We’re Just Getting Started: $35M Series C to Continue Innovation

They told us the WAF market was destined to remain insignificant—no technology innovations had been ...

Protecting Financial Applications at Scale

Picture this: you’ve found the perfect home, but need financing. You select a lender online and begi...

Visualizing Attack and Signal Trends Across Your Sites

We’re excited to announce the launch of the new overview page for your entire organization. As the c...

Cloud Native Security Challenges and Opportunities

Cloud computing is often the cornerstone of digital transformation efforts, and with the growth of c...

Expanding Power Rules with Shareable Lists

‘Tis the season of cool. Cooler temperatures, cool gifts, and cool holiday sweaters. To stay on them...

CISO Challenges and Security’s New Path with Zane Lackey

Last week, Zane Lackey, CSO / Co-Founder of Signal Sciences and O’Reilly author, sat down with Help ...

Seven Ways to Deploy Signal Sciences in Kubernetes

Sports coaches used to rely on paper playbooks to review strategy with their teams. Now, many levera...

Signal Sciences Named a 2018 Gartner Peer Insights Customers’ Choice for Web Application Firewalls

Read the 2020 Gartner Peer Insights Customers' Choice for Web Application Firewalls announcement here.   Signal Sciences is excited to…

A DevSecOps Fireside Chat with Alan Shimel

Recently I sat down with Alan Shimel of DevOps.com and discussed security, DevOps, and how it all fi...

Why Customers Choose Signal Sciences

We ask our customers early and often why they chose us as their next-gen WAF and RASP technology of choice.…

Delivering a better WAF—Faster

At Signal Sciences, we’re in the business of reimagining the WAF and our purpose is to redeem the goal it…

Surfacing Key Indicators of Account Takeovers

  Account takeover (ATO) is a threat to any organization that conducts financial or e-commerce trans...

The Pros and Cons of RASP in 8 Minutes

There are two concerning data points in application security today. First, the Verizon Data Breach I...

Dear RASP: We Need to Talk About the Friction in Our Relationship

Dear RASP, It is finally time for me to write you this letter. When we first met you were something…

Listening to Web Attacks Remixed!

Early last year I published a fun tool called sigsci-sounds for users of Signal Sciences — my prior ...

Moar Platform Support: Signal Sciences is Now Available on Kong Hub for Microservices, API, and Serverless Support

The rise of the API Gateway In the dramatic shift to microservices and APIs to speed up development ...

Security’s Shift Right

Software development has gotten tricky. If you have been in the DevOps game in the past few years, t...

Aggregate Availability Check with Signal Sciences Data

Having the privilege to work with so many great enterprise customers has its benefits. One great benefit is you are…

Auditing Signal Sciences Configuration

Signal Sciences offers tremendous capabilities to defend web applications. I’m not talking just abou...

Using Signal Sciences to Defend Apache Struts CVE-2018-11776

Patching servers is a notoriously difficult problem to address. Software gets out-of-date and new vu...

Introducing go-sigsci: A Go library for the Signal Sciences API

Signal Sciences was built with an API-first design from day one, meaning you can get to all of the d...

Introducing New Product Features: Power Rules and Network Learning Exchange (NLX)

We've just come out of our bi-annual company meeting held at HQ in Culver City, CA and we have excit...

Proactive Update Around the Health of your Signal Sciences Deployment

Signal Sciences Agent Monitoring In your efforts to defend your network and applications, deploying ...

Join Signal Sciences at Black Hat 2018

We are excited to return to one of our favorite conferences, Black Hat 2018, in Vegas, August 7-9! J...

Capturing Request Logs From Signal Sciences

Logs are important. We need them to investigate, monitor, and analyze. In cybersecurity we have many...

Security in the Trenches in Media and Journalism

For the last several years, media organizations have been targets of cyber attacks, making applicati...

New Event Timeline Helps Teams See Detailed Insights Into Blocked Attacks

Here at Signal Sciences, our Product and Technology teams adhere to three core product principles fo...

What the DevSecOps 2018 Survey Results Really Mean for Developers and Security

The 2018 DevSecOps Community Report is out and for those following the growth of DevOps and it’s sub...

Finding More Bugs Won’t Fix AppSec

In the 2018 Verizon Data Breach Investigations Report (DBIR), web applications were the number one s...

Demand More From Your Web Application Firewall

Photo by Kristina Flour on Unsplash I want to let you in on a little secret. About a year ago I had ...

DevOps Notes from the Field

 

Oops, I WAFed my Cache

  It’s annoying when we use acronyms as verbs, isn’t it? I can change, maybe. JIRA me and I will get...

The Importance of Unified Application Security for Your Multi-cloud Strategy

A word from the product marketing and alliances team today!

What’s New in SigSci – RSA 2018 Edition!

RSA is finally here! We had to wait an extra 2 months - remember it was in February last year? Well,...

Meet Signal Sciences at RSA 2018

Signal Sciences is excited to announce we will be at RSA 2018, held at Moscone Center in San Francis...

Three Ways Legacy WAFs Fail

Ah, the WAF. You might know it by its street name: the web application firewall. It’s a long standin...

Team Member Spotlight: Cody Wood

 “A bit over three years ago, I was working as a Plant Operator in the high desert of California…”

Recap: Camp Sig Sci 2018

Two weeks ago was a big one for Signal Sciences. All 80 of our employees were in Culver City for a c...

The Trending Target of Crypto Miners: Your Web Application

At the beginning of every year, the media covering cyber security is hot on predictions for the comi...

DevOps (and DevSecOps) Predictions for 2018

This article originally appeared on devops.com, written by Signal Sciences' James Wickett. [Read an ...

Q&A: CSO Zane Lackey Discusses Industry Highlights, DevOps & Security Trends, and What to Expect in 2018

 

Security is in Crisis and a New Journey Begins

Last month in San Francisco, the DevOps tribe gathered under the umbrella of DevOps Enterprise Summi...

DevOps and Security in Practice at Chef – A Case Study

Chef’s mission is to help transformative companies become fast, efficient, and innovative software-d...

Signal Sciences at AWS re:Invent 2017 Announcing New AWS Marketplace Listing

We are excited to be sponsoring this year’s AWS re:Invent in Las Vegas, November 27-Dec 1. We’re the...

Embedding Web Application Security Into Retail DevOps – A Case Study

According to the 2017 Verizon Data Breach Report, the Retail and Accommodation industries combined a...

Signal Sciences has a new HQ

Signal Sciences is thrilled to announce we have moved to new headquarters in Culver City’s stunning ...

Signal Sciences at SpringOne Platform 2017

Signal Sciences is proud to be presenting at this year’s SpringOne Platform conference in San Franci...

DevOps School is now in Session!

Over the last 12 months, I (James Wickett) have been working on a really exciting project to help ma...

Signal Sciences WPP Provides the Broadest Language Support; Adds New Language to RASP Module

  Application security needs to work with developers – or get left behind. To facilitate this alignm...

RASP Value Is Security Coverage

As an former engineer, I am biased towards getting excited around toys that blink, light up, and are...

Signal Sciences Joins Splunk Adaptive Response Initiative

From alerts to actions: Signal Sciences Joins Splunk Adaptive Response Initiative to bring powerful ...

What Can We Learn from the Equifax Breach?

Here we go again. Another massive data breach has exposesd extremely sensitive personal information,...

Go Development Tools for Testing and Hot Reloading

Those new to the Go language (golang) often are excited about the simplicity, speed and portability ...

Securing Microservices and APIs with NGINX and Signal Sciences

A shift is happening in the tech industry: monolithic web applications are being decomposed into mic...

Starting the Avalanche: Application DoS In Microservice Architectures

This upcoming Modern Security Episode will introduce you to one of the most devastating ways to caus...

Detect and Defend Account Takeovers

The storyline is a familiar one — millions of accounts compromised, data leaked to the internet, sol...

Practical Tips for Defending Web Applications In The Age Of DevOps

We are excited to announce an encore presentation by Zane Lackey, CSO of Signal Sciences, of his tal...

0 to 100 mph: Accelerating Visibility for Application Security

In a drag race, how quickly you get off the line sets the tone for the race. From there it is all ab...

Business Logic Flaws

  Protect Your Unique Snowflake from the Dark Side  I haven’t always been a “business” guy. As a mat...

Meet Signal Sciences this Summer during Black Hat / Def Con!

Signal Sciences is thrilled to participate in this month’s upcoming Black Hat and Def Con festivitie...

Why Rugged Matters in the Dev, Sec, and Ops Discussion

Last week we discussed how security and continuous delivery can be traveling companions, this week I...

Traveling Companions: Continuous Delivery and Security

Security and Continuous Delivery. They are unlikely friends because security has historically taken ...

Meet Cool Vendor Signal Sciences at the Gartner Security & Risk Management Summit 2017

  Attending the event? Visit us in Booth #240
Back To Top