Team Wabbi
February 15, 2024
Click the link below to listen to Tech Bytes’ interview with Wabbi’s Founder & CEO, Brittany Greenfield. She talks with host, Dan Hafner about AppSec and DevSecOps.
This interview originally appeared on Spotify for Podcasters – Tech Bytes
About the session
This session is a podcast episode where guest, Brittany Greenfield, discusses the importance of integrating security into software development with host, Dan Hafner. They delve into the challenges of cybersecurity, the role of artificial intelligence (AI), and the services offered by Brittany’s platform, Wabbi.
Key speakers
- Dan Hafner, Host
- Brittany Greenfield, Founder and CEO of Wabbi
Agenda
- Introduction by Dan Hafner
- Discussion on the importance of integrating security into software development
- Introduction to Brittany Greenfield and her platform, Wabbi
- Discussion on the challenges and potential solutions in cybersecurity
- Discussion on the impact and potential risks of AI in cybersecurity
- Conclusion and final thoughts
Takeaways
Takeaway 1: Security should be a core part of software development
In the increasingly digitized world, application security is a crucial part of any organization’s cyber strategy. According to Brittany Greenfield, 9 out of 10 breaches begin due to defects in code. The conversation emphasized the importance of building security measures into the software development life cycle from the start.
Greenfield explains, “You can’t really have a robust cybersecurity program if you’re only relying on perimeter security because that’s the point when you get breached. Application security is saying, let’s build this more securely.” She further adds, “We don’t build a house, tell everybody to move in and say don’t worry, we’ll check and see if it’s safe later.”
The discussion highlighted the need to prioritize vulnerabilities – not every issue can be fixed, but it’s about identifying what must be fixed now, what can be fixed later, and what just needs to be monitored in case the risk profile changes.
Takeaway 2: AI and cybersecurity: Opportunities and challenges
Artificial Intelligence (AI) is making its mark in the cybersecurity landscape. While AI can be a force multiplier, helping to manage large data sets and automating processes, it also presents new challenges in the form of sophisticated fraud and the potential for increased vulnerabilities.
Greenfield observes, “AI and cybersecurity is nothing new because of the large data sets that cyber has always generated, it’s always been a really fertile testing ground for AI.” She further adds, “AI can really help…it’s really going to be a force multiplier in the cybersecurity industry to say, hey, you know, it’s what we were just talking about some of what we do, right?”
However, she warns of the dangers of AI, stating, “It’s easier for AI to make a fake Dan, whether it’s your voice or your picture…before somebody can catch it.” She suggests companies should manage AI with caution and common sense.
Takeaway 3: The importance of risk management in software development
In the realm of software development, risk management is paramount. Greenfield stresses the importance of considering an organization’s unique risk profile rather than assuming that a vendor’s security measures will suffice. She also highlights the often-overlooked human component of security.
Greenfield states, “Do not assume that your risk profile is the same as your neighbors and that’s really what it is.” She further explains, “This could all happen overnight, right…You could argue that maybe I don’t haven’t watched it yet because I know too, too closely how this could happen.”
Greenfield’s discussion offers a reminder that while technology continues to evolve rapidly, the human element remains a critical factor in managing and mitigating security risks.
Insights surfaced
- It’s crucial to include security in software development, as 9 out of 10 breaches begin due to defects in code.
- Developers need to understand the importance of security and prioritize fixing vulnerabilities in their code.
- Wabbi is a cybersecurity SaaS platform that translates security from development and vice versa, providing a platform for two parties that wouldn’t meet otherwise to connect.
- AI is both a potential risk and a helper in cybersecurity. It can make social engineering easier, but it can also help manage the large data sets generated in cybersecurity.
- The rapid evolution of technology is leading to a world where art imitates life, and vice versa, especially in the realm of cybersecurity.
Key quotes
- “We don’t build a house, tell everybody to move in and say don’t worry, we’ll check and see if it’s safe later. None of us would go into a building if we did that.”
- “We translate security from development and development back into security.”
- “The Japanese concept of wabi-sabi says let us accept the imperfection in things as a step towards enlightenment.”
- “The industry has accepted that you can really only fix about 5% of vulnerabilities that you have in a given month.”
- “AI and cybersecurity is nothing new because of that, The large data sets that cyber has always generated, it’s always been a really fertile testing ground for AI.”
- “It’s not that you have to build perfect security, but you know, this is also why you’re more likely actually to see a small business attack. That’s where most of the breaches and payouts come from, because they know that they let their guard down.”
Find out how you can bridge the gap between security and development once and for all.
Related Articles
Reframing the Perimeter: Why Remote Work Doesn’t Have to Mean Weaker Security
Reframing the Perimeter: Why Remote Work Doesn’t Have to Mean Weaker Security As remote and hybrid work becomes the norm, many leaders worry about the widening security perimeter — but the real risk isn’t where people are working. It’s how work is being done. In a...
Remote Work Cybersecurity Risks (And How To Reduce Them) – Forbes –
This article originally appeared on Forbes on December 15, 2025 Expert Panel® Forbes Councils Member Forbes Technology Council COUNCIL POST| Membership (Fee-Based) getty Remote and hybrid work have opened the door to greater flexibility, stronger talent pipelines and...
November DevSecOps Roundup: Ideas Shaping What’s Next
Hey! We’re back with the latest in DevSecOps, security by design, and everything in between. Grab your coffee ☕, and let’s dive in! 📌 Top Blogs 🟣 AI is Solving the Puzzle. Are You Missing the Corner Pieces? AI is rewriting the rules of cybersecurity—and attackers...
Invisible AppSec: The Future of Security That Moves at the Speed of Dev
Invisible AppSec: The Future of Security That Moves at the Speed of Dev The future of application security isn’t about building taller walls, creating more dashboards, or forcing developers to become part-time security experts. It’s about making security so seamlessly...
Why Your Vulnerability Backlog Will Never Shrink (and What to Do Instead)
Why Your Vulnerability Backlog Will Never Shrink (and What to Do Instead) For most organizations, the vulnerability backlog has become a permanent fixture of software development. Thousands of issues sit unresolved across code, containers, dependencies, and...
How Tech Companies Can Break Out Of Innovation Stagnation – Forbes –
This article originally appeared on Forbes on November 5, 2025 Expert Panel® Forbes Councils Member Forbes Technology Council COUNCIL POST| Membership (Fee-Based) getty For tech companies, early success can be both a gift and a trap. The same products and systems that...
Reclaiming Innovation: Why Tech Needs to Fall Back in Love with Problem-Solving
Reclaiming Innovation: Why Tech Needs to Fall Back in Love with Problem-Solving The tech industry was built on solving problems — not just building products. Yet as companies scale, many lose that original spark. Quarterly targets, feature checklists, and market...
Policy as Code: The Missing Link in DevSecOps Maturity
Policy as Code: The Missing Link in DevSecOps Maturity For years, the promise of DevSecOps has been clear: integrate security into development without slowing delivery. Organizations have invested heavily in automation, CI/CD pipelines, and vulnerability scanning. But...
New Insights, Big Ideas: Wabbi’s October DevSecOps Roundup
Monthly Roundup Hey! We’re back with the latest in DevSecOps, security by design, and everything in between. Grab your coffee ☕, and let’s dive in! 📌 Top Blogs 🔹 Beyond Automation: What True AppSec Orchestration Means in 2025 In 2025, AppSec success requires more than...
Zero Trust in AppSec: Why It Belongs in Your Pipelines, Too
Zero Trust in AppSec: Why It Belongs in Your Pipelines, Too Zero Trust has become a cornerstone of modern cybersecurity strategies. The principle is simple but powerful: “never trust, always verify.” Traditionally, Zero Trust has been applied at the network and access...
Wabbi Announces Findings of Annual Continuous Security Report
BOSTON / Press Release / May 6, 2024 Progress in Integrating Security into Software Development, Progress in Adoption, but Bottlenecks Persist Wabbi, the leading application security posture management platform, today announced the findings of its annual report on...
Wabbi Announces General Availability of its Advanced Application Security Risk Index Enabling Risk-Management-by-Design
BOSTON / Press Release / February 21, 2024 Wabbi, the leader in Application Security Posture Management (ASPM), today announced the general availability of its Advanced Wabbi Risk Index. The Application Security Risk Index is a key component of Wabbi’s...
Wabbi Announces Phil Lawrence as New CTO to Spearhead Next Generation Application Security Posture Management Platform
BOSTON, MA, USA / November 20, 2023 /Originally Published at EINPresswire.com Industry leading ASPM provider, Wabbi, has appointed Phil Lawrence as CTO to lead product vision and growth in this high-demand cybersecurity space. Today, Wabbi (www.wabbisoft.com), the...
Wabbi Founder & CEO, Brittany Greenfield, Named 40 under 40
BOSTON, MA, USA / August 16, 2023 Brittany Greenfield, CEO & Founder of Wabbi, the leading ASPM platform, has been named to Boston Business Journal's prestigious 40 Under 40 list for 2024. This annual award honors 40 outstanding professionals under the age of 40...
Wabbi Named in Three Gartner® Reports as ASPM Sample Vendor
BOSTON, MA, USA / August 1, 2023 For more information on Wabbi's Application Security Posture Management platform, visit https://wabbisoft.com. Wabbi, a leading provider of Application Security Posture Management (ASPM) solutions, is pleased to announce that it has...
WABBI NAMED IN 2023 GARTNER® HYPE CYCLE FOR APPLICATION SECURITY REPORT AS AN ASPM SAMPLE VENDOR
BOSTON, MA, USA / July 25, 2023 / Originally Published at EINPresswire.com/ Wabbi, the leading Application Security Posture Management (ASPM) platform, today announced that it has been recognized as a Sample Vendor for Application Security Posture Management (ASPM) in...
Wabbi Named in 2023 Gartner® How to Select DevSecOps Tools for Secure Software Delivery Report as an ASPM Sample Vendor
BOSTON, MA, USA / June 14, 2023 /Originally Published at EINPresswire.com Wabbi announces its inclusion in the 2023 Gartner® How to Select DevSecOps Tools for Secure Software Delivery report as an Application Security Posture Management (ASPM) sample vendor. Gartner®...
Wabbi Unlocks the Secret to Enterprise Secrets Management
Wabbi unveils new Secrets Mangement solution as part of their leading application security posture management and orchestration platform. BOSTON, MA, USA / May 17, 2023 /Originally Published at EINPresswire.com Today, Wabbi, a leader in Application Security Posture...
Wabbi Named to CyberTech 100 for Leadership in Application Security Posture Management & Orchestration for Financial Institutions
BOSTON, MA / May 11, 2023 / EINPresswire.com Wabbi, the leading application security posture management & orchestration company, announced today that it has been named in the CyberTech100 list for 2023. Sponsored by FinTech Global and now in its fourth year, the...
Wabbi Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2023
Wabbi Wins Editor’s Choice for DevSecOps in 11th Annual Global InfoSec Awards at #RSAC 2023 SAN FRANCISCO/ Press Release / April 24, 2023 Wabbi is proud to announce we have won the following award(s) from Cyber Defense Magazine (CDM), the industry’s leading electronic...
Why Your Vulnerability Backlog Will Never Shrink (and What to Do Instead)
Why Your Vulnerability Backlog Will Never Shrink (and What to Do Instead) For most organizations, the vulnerability backlog has become a permanent fixture of software development. Thousands of issues sit unresolved across code, containers, dependencies, and...
Reclaiming Innovation: Why Tech Needs to Fall Back in Love with Problem-Solving
Reclaiming Innovation: Why Tech Needs to Fall Back in Love with Problem-Solving The tech industry was built on solving problems — not just building products. Yet as companies scale, many lose that original spark. Quarterly targets, feature checklists, and market...
Policy as Code: The Missing Link in DevSecOps Maturity
Policy as Code: The Missing Link in DevSecOps Maturity For years, the promise of DevSecOps has been clear: integrate security into development without slowing delivery. Organizations have invested heavily in automation, CI/CD pipelines, and vulnerability scanning. But...
Zero Trust in AppSec: Why It Belongs in Your Pipelines, Too
Zero Trust in AppSec: Why It Belongs in Your Pipelines, Too Zero Trust has become a cornerstone of modern cybersecurity strategies. The principle is simple but powerful: “never trust, always verify.” Traditionally, Zero Trust has been applied at the network and access...
From Reactive to Proactive: Why AppSec Needs to Evolve Beyond Scanning
From Reactive to Proactive: Why AppSec Needs to Evolve Beyond Scanning For years, application security has been stuck in a reactive cycle. Teams run scans, wait for results, chase long lists of vulnerabilities, and try to patch as quickly as possible. While this...
From Weak Link to First Line of Defense: How DevSecOps Turns Teams into Security Partners
From Weak Link to First Line of Defense: How DevSecOps Turns Teams into Security Partners We’ve all heard it: People are the weakest link in cybersecurity. And in software development, it often feels true—developers skipping scans to hit a release date, ops teams...
Security That Doesn’t Get in the Way: Why Dev Experience is the Real Key to DevSecOps
Security That Doesn’t Get in the Way: Why Dev Experience is the Real Key to DevSecOps We say we want to “shift left.” We say we want secure code from the start. But too often, security tools and processes still expect developers to leave their workflows, learn new...
AI is Solving the Puzzle. Are You Missing the Corner Pieces?
AI is Solving the Puzzle. Are You Missing the Corner Pieces? The game has changed—and it’s moving faster than ever. Artificial intelligence is no longer just a tool for innovation. It’s now a powerful asset in the hands of attackers, helping them scan, test, and...
Security That Works How Developers Work: Why Dev-Centric Design is Non-Negotiable
Security That Works How Developers Work: Why Dev-Centric Design is Non-Negotiable For years, application security has been treated as a destination—something developers "hand off" for validation at the end of the build process. But in a world of continuous...
Secure by Design: Embedding Risk-Based AppSec in Every Sprint
Secure by Design: Embedding Risk-Based AppSec in Every Sprint In the high-speed development world, embedding security into the software development lifecycle (SDLC) is no longer optional—it’s foundational. But as teams work to shift left and integrate security...
