Author: Phillip Maddux
Dear RASP: We Need to Talk About the Friction in Our Relationship
Dear RASP, It is finally time for me to write you this letter. When we first met you were something new and exciting. I had never seen anything in application security (AppSec) like you before. You were a different and…
Listening to Web Attacks Remixed!
Early last year I published a fun tool called sigsci-sounds for users of Signal Sciences — my prior ...
Aggregate Availability Check with Signal Sciences Data
Having the privilege to work with so many great enterprise customers has its benefits. One great benefit is you are always learning something new. With a diverse set of organizations operating in different ways and seeking to solve different problems,…
Auditing Signal Sciences Configuration
Signal Sciences offers tremendous capabilities to defend web applications. I’m not talking just abou...
Proactive Update Around the Health of your Signal Sciences Deployment
Signal Sciences Agent Monitoring In your efforts to defend your network and applications, deploying ...
Capturing Request Logs From Signal Sciences
Logs are important. We need them to investigate, monitor, and analyze. In cybersecurity we have many...
0 to 100 mph: Accelerating Visibility for Application Security
In a drag race, how quickly you get off the line sets the tone for the race. From there it is all ab...
Considering RASP and Modern Application Security Defense
Are you considering RASP? Certainly many enterprises large and small are so you aren’t alone. Having...
System Clock Skewed? Read this Post, Especially if You Don’t Have Time
“Time keeps on slippin’ slippin’ slippin’, into the future” -“Fly Like An Eagle”, The Steve Miller B...
Listening To Web Attacks
Note: this tool has been updated from the details below. Read the updated 2018 information on sigsci...
Sharing Threat Information with HoneyDB
Running honeypots to collect information is great. Running honeypots to collect and share informatio...
Getting Started With HoneyPy — Part 3
In my last post, Getting Started With HoneyPy — Part 2, I covered honeypot services and HoneyPy’s se...
Getting Started With HoneyPy — Part 2
source In my last post, Getting Started With HoneyPy — Part 1, I covered getting HoneyPy up and runn...
Getting Started With HoneyPy — Part 1
In my last post, Introduction to HoneyPy & HoneyDB, I covered the basics of honeypots and provided a...
Hacking the Hard Way at the DerbyCon CTF
DerbyCon in Louisville is one of those conferences that you have to go back to every year. While the...
Introduction to HoneyPy & HoneyDB
Last week, I discussed HoneyPy and HoneyDB at Blackhat and Defcon. This week I wanted to dive a bit ...