Virtual-Patch-Pipeline     

Sponsored by sigsci-logo__primary (1)

July 9, 2019

1 PM ET 

 

Addressing web server vulnerabilities is key to application security. Consider the impact the Apache Struts vulnerability had on organizations that ignored it and it suddenly becomes clear that responding quickly to Common Vulnerabilities and Exposures (CVE’s) is part of an effective appsec security posture.

Real world business conditions are not always conducive to patching software in a timely manner.  An automated method of identifying and triaging CVEs from qualification to virtual patches can be achieved with a robust process for staying on top of the latest CVE related vulnerabilities.  

In this webinar, we’ll talk with Cody Wood, AppSec Product Support Engineer at Signal Sciences, to learn about:

  • The kinds of CVEs that a next-gen WAF can address
  • How real-time monitoring can identify novel attackers and payloads
  • How to address vulnerabilities using next-gen WAF rules until a formal patch is issued

Cody Wood

Cody Wood, AppSec Product Support Engineer, Signal Sciences

Dirt miner turned application security fanatic. Often straddling multiple departments and roles, the appsec bug bit Cody in Houston, TX at the Threat Research Center working for Whitehat Security.  Cody has also worked for brief periods in both builder and breaker roles. At Signal Scienecs, he currently focuses on researching and expanding Signal Sciences vulnerability specific rules coverage.