Signal Sciences
Fastly Next-Gen WAF’s edge deployment option protects business-critical applications and APIs
Fastly launched the edge deployment option for the Fastly Next-Gen WAF (powered by Signal Sciences). This marks a key milestone in integrating Signal Sciences’ trusted web …
42Crunch expands its global team with two key executive appointments
42Crunch announced two key senior additions to its growing global team. Stephen Gomann has been appointed as Chief Revenue Officer (CRO) to lead the company’s sales …
2020 forecast: Attackers will target non-traditional systems
While plenty of attacks will continue to hit traditional targets such operating systems and humans, 2020 will see many attackers taking aim at non-traditional systems. …
Avoiding the next breach: Four tips for securing your apps
As security incidents continue to be an ongoing threat to businesses on a daily basis, keeping security procedures up-to-date and avoiding the next breach have become …
Signal Sciences unveils new application protection solution for Istio
Signal Sciences, the fastest growing web application security company in the world, announced the general availability of the first application protection solution for Istio, …
Webinar: Application Protection and Performance Monitoring Using Datadog + Signal Sciences
For years, security, operations, and engineering have struggled to get one cohesive view of application performance and real-time attacks due to multiple streams of data from …
Webinar: Securing Web Layer Assets with Cloud WAF
Developers and operations teams are under constant pressure to release new features and capabilities that keep their organizations ahead of competitors. But when “Innovate!” …
Signal Sciences’ WAF and RASP solution interoperates effectively with Pivotal Container Service
Signal Sciences, the fastest growing web application security company in the world, announced its Pivotal Container Service (PKS) integration. The integration ensures that …
Whitepaper: Identifying Web Attack Indicators
Attackers are always looking for ways into web and mobile applications. The 2019 Verizon Data Breach Investigation Report listed web applications the number ONE vector …
eBook: The DevOps Roadmap for Security
DevOps is concerned with uniting two particular tribes: development and operations. These tribes have seemingly competing priorities: developers value features while …
Security capabilities are lagging behind cloud adoption
Security professionals regard their existing tools inadequate for securing critical cloud data, even as their organizations invest heavily, with increasing speed, in cloud …
Could audio warnings augment your ability to fight off cyber attacks?
The security of your environment shouldn’t depend on whether you’re looking in the right place at the right time. While active visual means such as dashboards, emails, …
Featured news
Sponsored
Don't miss
- EU adopts Cyber Resilience Act to secure connected products
- DORA regulation’s nuts and bolts
- Unlocking the power of cryptographic agility in a quantum world
- Actively exploited Firefox zero-day fixed, update ASAP! (CVE-2024-9680)
- Internet Archive data breach, defacement, and DDoS: Users’ data compromised