Getting Started With HoneyPy — Part 3 In my last post, Getting Started With HoneyPy — Part 2, I covered honeypot services and HoneyPy’s se...by Phillip MadduxOctober 27, 2016
Getting Started With HoneyPy — Part 2 source In my last post, Getting Started With HoneyPy — Part 1, I covered getting HoneyPy up and runn...by Phillip MadduxOctober 20, 2016
Top Ten Tweets of AppSecUSA 2016 AppSecUSA 2016 wrapped up last week. To recap the event, we have captured what we think are the Top ...by Signal SciencesOctober 18, 2016
Modern Security Series: Dangers of DevOps Monotheism Don’t miss this event, register here > https://www.signalsciences.com/resources/dangers-of-devops-mo...by Signal SciencesOctober 17, 2016
Getting Started With HoneyPy — Part 1 In my last post, Introduction to HoneyPy & HoneyDB, I covered the basics of honeypots and provided a...by Phillip MadduxOctober 11, 2016
Top 5 AppSec Defense needs in the Modern Era Spinning the Top 5 AppSec Defense needs in the Modern Era, Casey Kasem style. The world has been doi...by James WickettSeptember 13, 2016
Introduction to HoneyPy & HoneyDB Last week, I discussed HoneyPy and HoneyDB at Blackhat and Defcon. This week I wanted to dive a bit ...by Phillip MadduxSeptember 1, 2016
Blackhat and Defcon… It’s a wrap! The Signal Sciences’ cabana at Blackhat Last week, we brought the Signal Sciences crew to Blackhat a...by Signal SciencesAugust 9, 2016
A Reference Model for DevOps The world needs a reference for collecting common DevOps principles and practices that are currently...by James WickettJune 16, 2016
The Flow of Continuously Delivered Security the future… it probably wont look like this ( source) Continuous Delivery meets Security and magical...by James WickettMay 24, 2016
The Next Frontier of DevOps: Security the future! it probably wont look like this… source Security is the next frontier of DevOps. Its a ...by James WickettMay 10, 2016
Rugged DevOps: Making Invisible Things Visible You might already know them from theagileadmin.com, but let me introduce you to two of the leading m...by Signal SciencesApril 26, 2016
More Silo Smashing Ideas, bringing InfoSec and DevOps together Silo Smashing! (source http://ports.co.za/admin/large/image-587.jpg) Last week I wrote an article on...by James WickettApril 5, 2016
The Legacy WAF Status Quo: User Expectations Are Changing sta·tus quo - stādəs ˈkwō/ - noun the existing state of affairs, The “existing state of affairs” is ...by Brian GreeneMarch 29, 2016
Lean Security: Add Business Value without Bringing Waste Just a screenshot, scroll down for the real video! This presentation was given at DevOps Connect: Ru...by Signal SciencesMarch 22, 2016
InfoSec Confession: We protect the wrong things and we slow everything down One of the secrets of InfoSec is that while we are spending a lot of resources on security professio...by James WickettMarch 10, 2016
A Recap of DevOps Connect: Rugged DevOps at RSAC 2016 First, I would like to give a big “thank you” to the organizers of DevOps Connect: Rugged DevOps at ...by James WickettMarch 8, 2016
We’re not your typical vendor. After two years of heads down product development and eight months of general release, I’m excited t...by Andrew PetersonFebruary 25, 2016
The Elusive Unicorn of the New AppSec As the brainchild of the development and operations departments of your business, DevOps is the unic...by Tyler ShieldsFebruary 16, 2016
Why DevOps and Product Teams Hate Web Application Firewalls Welcome to WAF Jeopardy — Where you have the answers and we ask the questions! Here’s some security ...by Max AndersonJanuary 27, 2016
Security in an Agile and DevOps World Recently I was able to join a panel for SecCasts Live hosted by Ken Johnson (@cktricky) at nVisium.by James WickettDecember 18, 2015
Rugged Software Engineering from LASCON I may be a little biased because I co-founded the conference back in 2010, however, one of my favori...by James WickettDecember 11, 2015