Interview with Tech Bytes on AppSec & DevSecOps

Team Wabbi

February 15, 2024

Click the link below to listen to Tech Bytes’ interview with Wabbi’s Founder & CEO, Brittany Greenfield. She talks with host, Dan Hafner about AppSec and DevSecOps.

This interview originally appeared on Spotify for Podcasters – Tech Bytes

About the session 

This session is a podcast episode where guest, Brittany Greenfield, discusses the importance of integrating security into software development with host, Dan Hafner. They delve into the challenges of cybersecurity, the role of artificial intelligence (AI), and the services offered by Brittany’s platform, Wabbi. 

Key speakers 

  • Dan Hafner, Host 
  • Brittany Greenfield, Founder and CEO of Wabbi 

Agenda 

  • Introduction by Dan Hafner 
  • Discussion on the importance of integrating security into software development 
  • Introduction to Brittany Greenfield and her platform, Wabbi 
  • Discussion on the challenges and potential solutions in cybersecurity 
  • Discussion on the impact and potential risks of AI in cybersecurity 
  • Conclusion and final thoughts 

Takeaways 

Takeaway 1: Security should be a core part of software development 

In the increasingly digitized world, application security is a crucial part of any organization’s cyber strategy. According to Brittany Greenfield, 9 out of 10 breaches begin due to defects in code. The conversation emphasized the importance of building security measures into the software development life cycle from the start. 

Greenfield explains, “You can’t really have a robust cybersecurity program if you’re only relying on perimeter security because that’s the point when you get breached. Application security is saying, let’s build this more securely.” She further adds, “We don’t build a house, tell everybody to move in and say don’t worry, we’ll check and see if it’s safe later.” 

The discussion highlighted the need to prioritize vulnerabilities – not every issue can be fixed, but it’s about identifying what must be fixed now, what can be fixed later, and what just needs to be monitored in case the risk profile changes. 

Takeaway 2: AI and cybersecurity: Opportunities and challenges 

Artificial Intelligence (AI) is making its mark in the cybersecurity landscape. While AI can be a force multiplier, helping to manage large data sets and automating processes, it also presents new challenges in the form of sophisticated fraud and the potential for increased vulnerabilities. 

Greenfield observes, “AI and cybersecurity is nothing new because of the large data sets that cyber has always generated, it’s always been a really fertile testing ground for AI.” She further adds, “AI can really help…it’s really going to be a force multiplier in the cybersecurity industry to say, hey, you know, it’s what we were just talking about some of what we do, right?” 

However, she warns of the dangers of AI, stating, “It’s easier for AI to make a fake Dan, whether it’s your voice or your picture…before somebody can catch it.” She suggests companies should manage AI with caution and common sense. 

Takeaway 3: The importance of risk management in software development 

In the realm of software development, risk management is paramount. Greenfield stresses the importance of considering an organization’s unique risk profile rather than assuming that a vendor’s security measures will suffice. She also highlights the often-overlooked human component of security. 

Greenfield states, “Do not assume that your risk profile is the same as your neighbors and that’s really what it is.” She further explains, “This could all happen overnight, right…You could argue that maybe I don’t haven’t watched it yet because I know too, too closely how this could happen.” 

Greenfield’s discussion offers a reminder that while technology continues to evolve rapidly, the human element remains a critical factor in managing and mitigating security risks. 

Insights surfaced 

  • It’s crucial to include security in software development, as 9 out of 10 breaches begin due to defects in code. 
  • Developers need to understand the importance of security and prioritize fixing vulnerabilities in their code. 
  • Wabbi is a cybersecurity SaaS platform that translates security from development and vice versa, providing a platform for two parties that wouldn’t meet otherwise to connect. 
  • AI is both a potential risk and a helper in cybersecurity. It can make social engineering easier, but it can also help manage the large data sets generated in cybersecurity. 
  • The rapid evolution of technology is leading to a world where art imitates life, and vice versa, especially in the realm of cybersecurity. 

Key quotes 

  • “We don’t build a house, tell everybody to move in and say don’t worry, we’ll check and see if it’s safe later. None of us would go into a building if we did that.” 
  • “We translate security from development and development back into security.” 
  • “The Japanese concept of wabi-sabi says let us accept the imperfection in things as a step towards enlightenment.” 
  • “The industry has accepted that you can really only fix about 5% of vulnerabilities that you have in a given month.” 
  • “AI and cybersecurity is nothing new because of that, The large data sets that cyber has always generated, it’s always been a really fertile testing ground for AI.” 
  • “It’s not that you have to build perfect security, but you know, this is also why you’re more likely actually to see a small business attack. That’s where most of the breaches and payouts come from, because they know that they let their guard down.” 

Find out how you can bridge the gap between security and development once and for all. 

Related Articles

Maximizing ROI: The Strategic Advantage of AppSec Orchestration

Maximizing ROI: The Strategic Advantage of AppSec Orchestration

Maximizing ROI: The Strategic Advantage of AppSec Orchestration Cybersecurity teams have long faced a dilemma: how do you measure success when the best outcome is that nothing goes wrong? Traditional ROI models don’t apply cleanly to security—until you introduce...

Balancing Act: Integrating Security Seamlessly into User Experience 

Balancing Act: Integrating Security Seamlessly into User Experience 

Balancing Act: Integrating Security Seamlessly into User Experience  In today’s hyper-connected world, users expect seamless digital experiences—fast, intuitive, and secure. Yet for many organizations, the traditional tug-of-war between security and user experience...

Why Process Must Come Before Products in DevSecOps  

Why Process Must Come Before Products in DevSecOps  

Why Process Must Come Before Products in DevSecOps  One foundational principle that’s often overlooked in the race to adopt DevSecOps is prioritizing process over products. While many organizations focus on selecting the right tools, The real key to DevSecOps success...

Why Dev Sec Ops Is the Key to Preventing Cybersecurity Risks 

Why Dev Sec Ops Is the Key to Preventing Cybersecurity Risks 

In today’s hyperconnected world, cybersecurity isn’t a nice-to-have — it’s a necessity. Yet, for many organizations, security is still an afterthought in the software development process. In a recent podcast interview, Brittany Greenfield, Founder and CEO of Wabbi,...

The Wabbi Wire: What’s the Big Deal about ASPM?

The Wabbi Wire: What’s the Big Deal about ASPM?

Wabbi Wire: What's the Big Deal about ASPM? Application Security Posture Management (ASPM) is more than just another security acronym—it’s the key to turning DevSecOps from a buzzword into a business enabler. The challenge? Security and development teams often speak...

AI and DevSecOps : Empowering the Workforce

AI and DevSecOps : Empowering the Workforce

AI and DevSecOps: Empowering the Workforce  The cybersecurity industry is at a pivotal moment, facing a confluence of challenges, from a growing talent shortage to the increasing complexity of threats. Artificial Intelligence (AI) has emerged as both a solution and a...

DevSecOps in Digital Transformation

DevSecOps in Digital Transformation

Click below to listen to this episode of Digital Shifts aka Corporate Evolution Tales, where host Mariam sits down with Brittany Greenfield, founder and CEO of Wabbi, to discuss how to align security with business goals, and why transformation is a continuous...

Building A Secure SDLC to Make DevSecOps a Daily Habit

Building A Secure SDLC to Make DevSecOps a Daily Habit

Building a Secure SDLC to Make DevSecOps a Daily Habit In a world where security and development teams juggle countless priorities, building a secure SDLC must not take a backseat. It is not a luxury or an add-on but a fundamental practice that development...

The Hidden Risks: Internal Failures in Security by Design

The Hidden Risks: Internal Failures in Security by Design

The Hidden Risks: Internal Failures in Security by Design  When we think about cybersecurity breaches, external attackers often come to mind—hackers, malware, and cybercriminals targeting organizations from the outside. However, breaches can also stem from within,...

Tech Deep Dives: DevSecOps Secrets

Tech Deep Dives: DevSecOps Secrets

Click below to listen to this episode of Kabir's Tech Dives, where host Kabir sits down with Brittany Greenfield, founder and CEO of Wabbi, to discuss how Wabbi is revolutionizing application security, the role of cybersecurity in development, and why modern...

Wabbi Founder & CEO, Brittany Greenfield, Named 40 under 40

Wabbi Founder & CEO, Brittany Greenfield, Named 40 under 40

BOSTON, MA, USA / August 16, 2023  Brittany Greenfield, CEO & Founder of Wabbi, the leading ASPM platform, has been named to Boston Business Journal's prestigious 40 Under 40 list for 2024. This annual award honors 40 outstanding professionals under the age of 40...

Wabbi Named in Three Gartner® Reports as ASPM Sample Vendor

Wabbi Named in Three Gartner® Reports as ASPM Sample Vendor

BOSTON, MA, USA / August 1, 2023 For more information on Wabbi's Application Security Posture Management platform, visit https://wabbisoft.com. Wabbi, a leading provider of Application Security Posture Management (ASPM) solutions, is pleased to announce that it has...

Wabbi Unlocks the Secret to Enterprise Secrets Management

Wabbi Unlocks the Secret to Enterprise Secrets Management

Wabbi unveils new Secrets Mangement solution as part of their leading application security posture management and orchestration platform. BOSTON, MA, USA / May 17, 2023 /Originally Published at EINPresswire.com Today, Wabbi, a leader in Application Security Posture...

Why Process Must Come Before Products in DevSecOps  

Why Process Must Come Before Products in DevSecOps  

Why Process Must Come Before Products in DevSecOps  One foundational principle that’s often overlooked in the race to adopt DevSecOps is prioritizing process over products. While many organizations focus on selecting the right tools, The real key to DevSecOps success...

Why Dev Sec Ops Is the Key to Preventing Cybersecurity Risks 

Why Dev Sec Ops Is the Key to Preventing Cybersecurity Risks 

In today’s hyperconnected world, cybersecurity isn’t a nice-to-have — it’s a necessity. Yet, for many organizations, security is still an afterthought in the software development process. In a recent podcast interview, Brittany Greenfield, Founder and CEO of Wabbi,...

AI and DevSecOps : Empowering the Workforce

AI and DevSecOps : Empowering the Workforce

AI and DevSecOps: Empowering the Workforce  The cybersecurity industry is at a pivotal moment, facing a confluence of challenges, from a growing talent shortage to the increasing complexity of threats. Artificial Intelligence (AI) has emerged as both a solution and a...

Building A Secure SDLC to Make DevSecOps a Daily Habit

Building A Secure SDLC to Make DevSecOps a Daily Habit

Building a Secure SDLC to Make DevSecOps a Daily Habit In a world where security and development teams juggle countless priorities, building a secure SDLC must not take a backseat. It is not a luxury or an add-on but a fundamental practice that development...

The Hidden Risks: Internal Failures in Security by Design

The Hidden Risks: Internal Failures in Security by Design

The Hidden Risks: Internal Failures in Security by Design  When we think about cybersecurity breaches, external attackers often come to mind—hackers, malware, and cybercriminals targeting organizations from the outside. However, breaches can also stem from within,...

Tackling Dev Sec Ops in 2025: A Practical Path Forward 

Tackling Dev Sec Ops in 2025: A Practical Path Forward 

The misconception of DevSecOps as a collection of tools or isolated practices has held back its true potential. In 2025, the shift will be about embedding security within every phase of development—not as an interruption, but as an enabler of efficient, secure...

Why AppSec Orchestration Delivers ROI for Dev, Sec & Ops Teams

Why AppSec Orchestration Delivers ROI for Dev, Sec & Ops Teams

Building Tangible ROI Through Dev Sec Ops Investments  Historically, it has been tough to justify the ROI of cybersecurity investments because cybersecurity success often means nothing happened: no breaches, data losses, or compliance failures. This “absence of...

Building Good Application Security Hygiene 

Building Good Application Security Hygiene 

In today’s fast-evolving tech landscape, application security (AppSec) hygiene is an essential factor for every business handling data. AppSec hygiene entails establishing thorough security processes, understanding risks, and ensuring that security protocols are...

0 Comments
Learn how our solutions can streamline your Application Security program.
Get Insights on AppSec Orchestration
Learn how our ASPM program can streamline your application security.
Get Insights on ASPM SOLUTIONS
Learn how our DevSecOps program can integrate security into your development.
Get Insights on DevSecOps Solutions