What’s Wabbi Talking About?
Continuous Security
What is Application Security Orchestration & Correlation?
What is Application Security Orchestration & Correlation (ASOC)? Application Security Orchestration & Correlation is the use of automation to manage components of an application security...
What is Risk-Based Vulnerability Management?
Risk-Based Vulnerability Management (RBVM) is a security strategy that aligns the risk profile of an organization with its remediation efforts in application security. It is designed to ensure that...
What is Vulnerability Management?
What is Vulnerability Management? Vulnerability management is the traditional core of an Application Security strategy. It is not just enough to scan, you have to aggregate and prioritize the...
Newsroom
Wabbi Recognized as a Sample Vendor in the 2022 Gartner® Hype Cycle™ for Application Security
Company Named in Application Security Orchestration & Correlation Category BOSTON / October 3, 2022 -- Wabbi, the leading Continuous Security platform, today announced the company has been...
Wabbi Showcases Highest Levels of Industry Recognition and Achievements at RSA Conference; Continues its Mission of Changing the Face of Application Security
BOSTON and SAN FRANCISCO, June 7, 2022 /PRNewswire/ -- Wabbi, the leading continuous security platform, today announced that the company has experienced unprecedented successes and received a...
Wabbi Named Winner of Two Coveted Global InfoSec Awards During RSA Conference 2022
Wabbi Selected Publishers Choice for Software Development Lifecycle Security Founder and CEO Brittany Greenfield named A Top Woman in Cybersecurity Boston, MA, and San Francisco, CA – June 6,...
Interviews
Interview with Hugh Taylor of CyberPolicy Institute:
What it Takes to Keep Code Secure
This interview originally appeared on The Journal of Cyber Policy, July 8 2022 Nine out of ten security breaches originate with defects in software code. This reality puts pressure on developers,...
Interview with Melinda Marks of ESG: “Women in Cybersecurity”
This interview originally appeared on ESG Global on June 3 2022Related Articles
Interview with Cybernews:
“The world of application security expands beyond the lines of code”
This interview originally appeared on Cybernews on April 20, 2022Cybercriminals aim to obtain valuable information in every way possible. Their attack vectors no longer only include sophisticated...