What’s Wabbi Talking About?
Continuous Security
Building A Secure SDLC to Make DevSecOps a Daily Habit
Building a Secure SDLC to Make DevSecOps a Daily Habit In a world where security and development teams juggle countless priorities, building a secure SDLC must not take a backseat. It is not a...
The Hidden Risks: Internal Failures in Security by Design
The Hidden Risks: Internal Failures in Security by Design When we think about cybersecurity breaches, external attackers often come to mind—hackers, malware, and cybercriminals targeting...
Behind Closed Doors: What AppSec Leaders Are Really Thinking About DevSecOps in 2025
Recently, I had the opportunity to sit down with a group of AppSec leaders for a closed-door conversation about their 2025 DevSecOps strategy. No vendors. No slides. Just candid discussions about...
Newsroom
Wabbi Accepted into Microsoft for Startups
Partnering to Enable Enterprises to Adopt Secure DevOps for Competitive Advantage Boston – December 24th, 2020 – Wabbi announced today that they have been admitted to the Microsoft for Startups...
Wabbi Statement on Recent Events
Like many people, my start of June 2020 has been filled with much conversation surrounding the protests around the country and the world in the wake of the death of George Floyd. As I believe we...
Wabbi Named to CIOReview’s 20 Most Promising DevOps Companies of 2020
Boston – June 16, 2020 – Wabbi, a SecDevOps orchestration platform, announced today that it has been named to CIOReview’s annual list of Most Promising DevOps Companies. A distinguished panel of...
Interviews
Interview with Hugh Taylor of CyberPolicy Institute:
What it Takes to Keep Code Secure
This interview originally appeared on The Journal of Cyber Policy, July 8 2022 Nine out of ten security breaches originate with defects in software code. This reality puts pressure on developers,...
Interview with Melinda Marks of ESG: “Women in Cybersecurity”
This interview originally appeared on ESG Global on June 3 2022Related Articles
Interview with Cybernews:
“The world of application security expands beyond the lines of code”
This interview originally appeared on Cybernews on April 20, 2022Cybercriminals aim to obtain valuable information in every way possible. Their attack vectors no longer only include sophisticated...









