What’s New with Wabbi

Why Log4j is a Lesson in Prioritization

The recent Log4j vulnerability, which Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called “the most serious vulnerability I have seen in my decades-long career,” forced many Security and Development teams to work through the holidays...

Wabbi enables Risk Management by Design with Release of Next-Gen Vulnerability Management in Release 23.1 

BOSTON / Press Release / March 27, 2023 Wabbi, the leading provider of Application Security Orchestration & Correlation, announced today the launch of their next-generation vulnerability management solution. With this new offering, Wabbi is now the only tool that...

Wabbi Recognized as Gold Winner in 2023 Cybersecurity Excellence Awards

BOSTON / Press Release / 6 March 2023 Wabbi, the leading Application Security Orchestration & Correlation platform, has been awarded multiple accolades in the 2023 Cybersecurity Excellence Awards. The awards recognize Wabbi's innovative approach to DevSecOps and...

How does Wabbi work?

Regardless of the size of an organization, cybersecurity is a requirement for anyone in the software business or tech industry. Sure there are a lot of cybersecurity platforms out there but Wabbi is unique in that it protects a software company’s IP, its team, and its...

Why is AppSec important?

We live in a world powered by software - and AppSec is everything but necessary from day 1. It’s vital for developers and operations security teams to integrate AppSec from the beginning of the development lifecycle. Recent research has shown 98% of companies believe...

Browse Articles

CONTINUOUS SECURITY

DevSecOps: Why it needs to be in every SDLC

DevSecOps: Why it needs to be in every SDLC

In a perfect development world, security is an integral part of the process and is integrated into the complete software development cycle. With practicing this approach, development teams implement security protocols and have a clear understanding of policies and...

The History of DevSecOps and Beyond

Way back in the day a long, long time ago DevSecOps began in 1976 and that began with a paper written that described the eleven attributes of quality. A lot of these concepts were very forward thinking. Now, you didn’t see a lot of security in the 70’s and there...

Security Risk Equals Business Risk

Security Risk Equals Business Risk

Every company today is a software company and as such we’re all facing security risk and same cybersecurity challenges. With 9 of 10 breaches occurring due to a software vulnerability, incidents like Solarwinds and Log4j have demonstrated that implementing basic...

NEWSROOM

INTERVIEWS

WordPress Video Lightbox Plugin