What’s Wabbi Talking About?
Continuous Security
What is Application Security Orchestration & Correlation?
What is Application Security Orchestration & Correlation (ASOC)? Application Security Orchestration & Correlation is the use of automation to manage components of an application security...
What is Risk-Based Vulnerability Management?
Risk-Based Vulnerability Management (RBVM) is a security strategy that aligns the risk profile of an organization with its remediation efforts in application security. It is designed to ensure that...
What is Vulnerability Management?
What is Vulnerability Management? Vulnerability management is the traditional core of an Application Security strategy. It is not just enough to scan, you have to aggregate and prioritize the...
Newsroom
Wabbi Named in 2023 Gartner® How to Select DevSecOps Tools for Secure Software Delivery Report as an ASPM Sample Vendor
BOSTON, MA, USA / June 14, 2023 /Originally Published at EINPresswire.com Wabbi announces its inclusion in the 2023 Gartner® How to Select DevSecOps Tools for Secure Software Delivery report as an...
Wabbi Unlocks the Secret to Enterprise Secrets Management
Wabbi unveils new Secrets Mangement solution as part of their leading application security posture management and orchestration platform. BOSTON, MA, USA / May 17, 2023 /Originally Published at...
Wabbi Named to CyberTech 100 for Leadership in Application Security Posture Management & Orchestration for Financial Institutions
BOSTON, MA / May 11, 2023 / EINPresswire.com Wabbi, the leading application security posture management & orchestration company, announced today that it has been named in the CyberTech100 list...
Interviews
Software Security Through the Concept of Wabi-Sabi with Radio Entrepreneurs
Radio Entrepreneurs host, Jeffrey Davis interview with Wabbi's Founder & CEO Brittany Greenfield on software security through the concept of Wabi-Sabi. This interview originally appeared on...
Interview with Hugh Taylor of CyberPolicy Institute:
What it Takes to Keep Code Secure
This interview originally appeared on The Journal of Cyber Policy, July 8 2022 Nine out of ten security breaches originate with defects in software code. This reality puts pressure on developers,...
Interview with Melinda Marks of ESG: “Women in Cybersecurity”
This interview originally appeared on ESG Global on June 3 2022Related Articles