Category: Web Application Security
Security Opportunities and Demands of Digital Transformation
As a customer-focused organization, we listen carefully to how organizations are dealing with Digita...
Modern Software Architectures Require Modern Web Security
There’s just no way around it: legacy web application firewalls are struggling to keep up in a lands...
Modern Web Security Meets Modern Load Balancing with NGINX
NGINX Certifies Signal Sciences Dynamic Module DevOps, microservices, hybrid and multi-cloud are fue...
Protecting Financial Applications at Scale
Picture this: you’ve found the perfect home, but need financing. You select a lender online and begi...
Expanding Power Rules with Shareable Lists
‘Tis the season of cool. Cooler temperatures, cool gifts, and cool holiday sweaters. To stay on them...
Why Customers Choose Signal Sciences
We ask our customers early and often why they chose us as their next-gen WAF and RASP technology of choice. Here are ten main reasons we hear across the board, and you can read the full white paper to dive…
Surfacing Key Indicators of Account Takeovers
Account takeover (ATO) is a threat to any organization that conducts financial or e-commerce trans...
Listening to Web Attacks Remixed!
Early last year I published a fun tool called sigsci-sounds for users of Signal Sciences — my prior ...
Security’s Shift Right
Software development has gotten tricky. If you have been in the DevOps game in the past few years, t...
Auditing Signal Sciences Configuration
Signal Sciences offers tremendous capabilities to defend web applications. I’m not talking just abou...
Using Signal Sciences to Defend Apache Struts CVE-2018-11776
Patching servers is a notoriously difficult problem to address. Software gets out-of-date and new vu...
Introducing New Product Features: Power Rules and Network Learning Exchange (NLX)
We've just come out of our bi-annual company meeting held at HQ in Culver City, CA and we have excit...
Proactive Update Around the Health of your Signal Sciences Deployment
Signal Sciences Agent Monitoring In your efforts to defend your network and applications, deploying ...
Capturing Request Logs From Signal Sciences
Logs are important. We need them to investigate, monitor, and analyze. In cybersecurity we have many...
The Importance of Unified Application Security for Your Multi-cloud Strategy
A word from the product marketing and alliances team today!
Three Ways Legacy WAFs Fail
Ah, the WAF. You might know it by its street name: the web application firewall. It’s a long standin...
RASP Value Is Security Coverage
As an former engineer, I am biased towards getting excited around toys that blink, light up, and are...
Securing Microservices and APIs with NGINX and Signal Sciences
A shift is happening in the tech industry: monolithic web applications are being decomposed into mic...
0 to 100 mph: Accelerating Visibility for Application Security
In a drag race, how quickly you get off the line sets the tone for the race. From there it is all ab...
Business Logic Flaws
Protect Your Unique Snowflake from the Dark Side I haven’t always been a “business” guy. As a mat...
Web Application Security: The New Way Forward
The Web Application Firewall (WAF). It’s tech that never really was. That statement might upset some...
About Signal Sciences Labs
Signal Sciences Labs is the research and tech behind Signal Sciences and their Next-Gen Web Applicat...
What’s in a Name? RASP Smells like a Rose
“What’s in a name? That which we call a rose by any other name would smell as sweet.” -William Shake...