What’s Wabbi Talking About?
Continuous Security
What is ASOC (and why does it matter?)
How does Wabbi work?
Regardless of the size of an organization, cybersecurity is a requirement for anyone in the software business or tech industry. Sure there are a lot of cybersecurity platforms out there but Wabbi is...
Why is AppSec important?
We live in a world powered by software - and AppSec is everything but necessary from day 1. It’s vital for developers and operations security teams to integrate AppSec from the beginning of the...
Newsroom
Wabbi Unlocks the Secret to Enterprise Secrets Management
Wabbi unveils new Secrets Mangement solution as part of their leading application security posture management and orchestration platform. BOSTON, MA, USA / May 17, 2023 /Originally Published at...
Wabbi Named to CyberTech 100 for Leadership in Application Security Posture Management & Orchestration for Financial Institutions
BOSTON, MA / May 11, 2023 / EINPresswire.com Wabbi, the leading application security posture management & orchestration company, announced today that it has been named in the CyberTech100 list...
Wabbi Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2023
Wabbi Wins Editor’s Choice for DevSecOps in 11th Annual Global InfoSec Awards at #RSAC 2023 SAN FRANCISCO/ Press Release / April 24, 2023 Wabbi is proud to announce we have won the following...
Interviews
Interview with Hugh Taylor of CyberPolicy Institute:
What it Takes to Keep Code Secure
This interview originally appeared on The Journal of Cyber Policy, July 8 2022 Nine out of ten security breaches originate with defects in software code. This reality puts pressure on developers,...
Interview with Melinda Marks of ESG: “Women in Cybersecurity”
This interview originally appeared on ESG Global on June 3 2022Related Articles
Interview with Cybernews:
“The world of application security expands beyond the lines of code”
This interview originally appeared on Cybernews on April 20, 2022Cybercriminals aim to obtain valuable information in every way possible. Their attack vectors no longer only include sophisticated...