Please turn on your JavaScript for this page to function normally.
security platform
Fastly Next-Gen WAF’s edge deployment option protects business-critical applications and APIs

Fastly launched the edge deployment option for the Fastly Next-Gen WAF (powered by Signal Sciences). This marks a key milestone in integrating Signal Sciences’ trusted web …

42Crunch expands its global team with two key executive appointments

42Crunch announced two key senior additions to its growing global team. Stephen Gomann has been appointed as Chief Revenue Officer (CRO) to lead the company’s sales …

2020 forecast: Attackers will target non-traditional systems

While plenty of attacks will continue to hit traditional targets such operating systems and humans, 2020 will see many attackers taking aim at non-traditional systems. …

gap
Avoiding the next breach: Four tips for securing your apps

As security incidents continue to be an ongoing threat to businesses on a daily basis, keeping security procedures up-to-date and avoiding the next breach have become …

Signal Sciences
Signal Sciences unveils new application protection solution for Istio

Signal Sciences, the fastest growing web application security company in the world, announced the general availability of the first application protection solution for Istio, …

Signal Sciences
Webinar: Application Protection and Performance Monitoring Using Datadog + Signal Sciences

For years, security, operations, and engineering have struggled to get one cohesive view of application performance and real-time attacks due to multiple streams of data from …

Signal Sciences
Webinar: Securing Web Layer Assets with Cloud WAF

Developers and operations teams are under constant pressure to release new features and capabilities that keep their organizations ahead of competitors. But when “Innovate!” …

Signal Sciences’ WAF and RASP solution interoperates effectively with Pivotal Container Service

Signal Sciences, the fastest growing web application security company in the world, announced its Pivotal Container Service (PKS) integration. The integration ensures that …

vulnerability
Whitepaper: Identifying Web Attack Indicators

Attackers are always looking for ways into web and mobile applications. The 2019 Verizon Data Breach Investigation Report listed web applications the number ONE vector …

DevOps ebook
eBook: The DevOps Roadmap for Security

DevOps is concerned with uniting two particular tribes: development and operations. These tribes have seemingly competing priorities: developers value features while …

cloud complexity
Security capabilities are lagging behind cloud adoption

Security professionals regard their existing tools inadequate for securing critical cloud data, even as their organizations invest heavily, with increasing speed, in cloud …

audio
Could audio warnings augment your ability to fight off cyber attacks?

The security of your environment shouldn’t depend on whether you’re looking in the right place at the right time. While active visual means such as dashboards, emails, …

Don't miss

Cybersecurity news