What’s Wabbi Talking About?
Continuous Security
Stopping the Log4j Bleed: Why Mature Security Processes Include a SBOM
Gone are the days when organizations could implement basic cybersecurity measures and assume they wouldn’t be necessary. In fact, cybercrime damages are now predicted to reach $10.5 trillion...
Why Log4j is a Lesson in Prioritization
The recent Log4j vulnerability, which Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called “the most serious vulnerability I have seen in my decades-long career,”...
Stop Treating Security like Leather Seats
When was the last time you had to buy a new car? Some enjoy the haggling while others hate it, but if you want to maximize your ability to negotiate on price you’ll need to review the car’s models...
Newsroom
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Interviews
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.