Latest News-

Continuous Security
What is Risk-Based Vulnerability Management?

What is Risk-Based Vulnerability Management?

Risk-Based Vulnerability Management (RBVM) is a security strategy that aligns the risk profile of an organization with its remediation efforts in application security. It is designed to ensure that an organization's resources are utilized efficiently and effectively...

What is Vulnerability Management?

What is Vulnerability Management?

What is Vulnerability Management? Vulnerability management is the traditional core of an Application Security strategy. It is not just enough to scan, you have to aggregate and prioritize the results. As 2/3 of organizations use at least 11-20 application security...

How does Wabbi work?

How does Wabbi work?

Regardless of the size of an organization, cybersecurity is a requirement for anyone in the software business or tech industry. Sure there are a lot of cybersecurity platforms out there but Wabbi is unique in that it protects a software company’s IP, its team, and its...

Why is AppSec important?

Why is AppSec important?

We live in a world powered by software - and AppSec is everything but necessary from day 1. It’s vital for developers and operations security teams to integrate AppSec from the beginning of the development lifecycle. Recent research has shown 98% of companies believe...

DevSecOps: Why it needs to be in every SDLC

DevSecOps: Why it needs to be in every SDLC

In a perfect development world, security is an integral part of the process and is integrated into the complete software development cycle. With practicing this approach, development teams implement security protocols and have a clear understanding of policies and...

The History of DevSecOps and Beyond

Way back in the day a long, long time ago DevSecOps began in 1976 and that began with a paper written that described the eleven attributes of quality. A lot of these concepts were very forward thinking. Now, you didn’t see a lot of security in the 70’s and there...

Security Risk Equals Business Risk

Security Risk Equals Business Risk

Every company today is a software company and as such we’re all facing security risk and same cybersecurity challenges. With 9 of 10 breaches occurring due to a software vulnerability, incidents like Solarwinds and Log4j have demonstrated that implementing basic...

What is Continuous Security?

What is Continuous Security?

The term “DevSecOps” has been on the rise in recent years, popularizing the idea that security needs to be included in the overall software development lifecycle. But with all this talk about DevSecOps comes a big question: does tacking on security tools and...

Stop Treating Security like Leather Seats

Stop Treating Security like Leather Seats

When was the last time you had to buy a new car? Some enjoy the haggling while others hate it, but if you want to maximize your ability to negotiate on price you’ll need to review the car’s models and options. For any given car, automakers generally present you with...

Why Federal?

Why Federal?

I was recently asked how Wabbi's federal strategy is different from our commercial strategy.  The answer is that it’s not. Both have teams look to ship software rapidly as a competitive advantage and understand security is a bottleneck when not deployed correctly. In...