Signal Sciences Kubernetes – Doug Coburn – PSW – Technical segme #614
Talk about the way Signal Sciences is implemented, especially in the container world. Where we sit in the stack for protection of the web apps in those containers and common first things identified after install (Attack Scanners, Injection Attacks, actionable anomalies like 404 or 500 errors). Finally do a short demo walking through installing Signal Sciences in a Kubernetes environment and the Signal Sciences dashboard.
To learn more about Signal Sciences, visit: https://securityweekly.com/signalsciences Full Show Notes: https://wiki.securityweekly.com/Episode614
Guest
Doug Coburn serves as Signal Sciences Director of Professional Services, where he leads the team that installs Signal Sciences in customers’ environments. Prior to Signal Sciences Doug entered the IaaS/PaaS/FaaS world with Iron.io doing Serverless Functions as a Service leading the Sales Engineering team. With Iron.io he got introduced to many of the cloud and PaaS platforms that make up the Serverless landscape. Before the Security and Serverless spaces, Doug also worked with companies like Okta, Moka5, and IBM/BigFix that had elements of security, endpoint management, and identity management.