Making security visible. Our product helps you prioritize your defensive efforts where your applications are actually targeted.
This week, the Los Angeles Times featured an article on the front page of the business/tech section on Signal Sciences. We were flattered and we wanted to share the link with out readers on Signal Sciences Labs. We hope you enjoy it!
To think like a hacker, start-up founder Andrew Peterson hired some people who know hackers well.
His co-founders at Venice cybersecurity start-up Signal Sciences Corp. include a guy whom companies used to pay to try to hack them and a guy who led engineers often responsible for leaving unintended holes in software.
The blend of expertise is informing software now used by dozens of companies, including Prezi, Under Armour and Chartbeat, to spot and quickly close gaps in their online programs that hackers exploit.
“If you view security as a tool instead of a liability, then you need a way to find where issues exist,” Peterson said during a conversation in Venice last week. “You can’t solve the problems you can’t see.”
You can’t solve the problems you can’t see. — Andrew Peterson, CEO Signal Sciences.
Signal Sciences’ program churns through the logs that show what information users are sending to a website or an app, and what they’re getting back in return, Peterson said. The goal is to identify “signals” in the large set of data that correspond to malicious activity.
Thanks for reading this article. If you enjoyed it please let us know by clicking that little heart below.
At Signal Sciences we are building the industry’s first Next Generation Web Application Firewall (NGWAF). Our NGWAF was built in response to our own frustrations of trying to use legacy WAFs while enabling business initiatives like DevOps, cloud adoption and continuous delivery. The Signal Sciences NGWAF works seamlessly across cloud, physical, and containerized infrastructure, providing security without breaking production traffic.