What’s Wabbi Talking About?
Continuous Security
Unlocking the Power of Risk Management: A Comparison to Your Trusted Fitness Tracker
Unlocking the Power of Risk Management: A Comparison to Your Trusted Fitness Tracker In the realm of cybersecurity and application security (AppSec), the importance of risk management cannot be...
Application Security Posture Management for VP of Engineering
Why Application Security Matters to Me:Evaluating Application Security Posture Management (ASPM) for VPs of Engineering In today’s digital landscape, where cyber threats are constantly evolving,...
Application Security Posture Management for CISOs
Why Application Security Matters to Me: Evaluating Application Security Posture Management (ASPM) for CISOs In today's digital landscape, where cyber threats are constantly evolving, organizations...
Newsroom
Wabbi Named Winner of Two Coveted Global InfoSec Awards During RSA Conference 2022
Wabbi Selected Publishers Choice for Software Development Lifecycle Security Founder and CEO Brittany Greenfield named A Top Woman in Cybersecurity Boston, MA, and San Francisco, CA – June 6,...
The Great Disconnect: Wabbi Publishes Annual Continuous Security Report 
Continuous Security is a Catalyst for Automated Collaboration and Has Decreased Vulnerabilities by 50% BOSTON, March 24, 2022 /PRNewswire/ -- Wabbi, the leading continuous security platform, today...
Introducing the Boston Inno Madness bracket
By Hannah Green - Inno Reporter March 03, 2022 Our Boston Inno Madness competition is here. We've got 64 local companies vying for the coveted title of 2022 Inno Madness champion. What is Inno...
Interviews
Why is DevSecOps Failing Us?
Why is DevSecOps Failing? Jim Mercer, Research Director, DevOps & DevSecOps at IDC and Brittany Greenfield, CEO & Founder of Wabbi discuss why DevSecOps is failing. IT and security leaders...
Interview with Hugh Taylor of CyberPolicy Institute:
What it Takes to Keep Code Secure
This interview originally appeared on The Journal of Cyber Policy, July 8 2022 Nine out of ten security breaches originate with defects in software code. This reality puts pressure on developers,...
Interview with Melinda Marks of ESG: “Women in Cybersecurity”
This interview originally appeared on ESG Global on June 3 2022Related Articles