Team Wabbi
February 15, 2024
Click the link below to listen to Tech Bytes’ interview with Wabbi’s Founder & CEO, Brittany Greenfield. She talks with host, Dan Hafner about AppSec and DevSecOps.
This interview originally appeared on Spotify for Podcasters – Tech Bytes
About the session
This session is a podcast episode where guest, Brittany Greenfield, discusses the importance of integrating security into software development with host, Dan Hafner. They delve into the challenges of cybersecurity, the role of artificial intelligence (AI), and the services offered by Brittany’s platform, Wabbi.
Key speakers
- Dan Hafner, Host
- Brittany Greenfield, Founder and CEO of Wabbi
Agenda
- Introduction by Dan Hafner
- Discussion on the importance of integrating security into software development
- Introduction to Brittany Greenfield and her platform, Wabbi
- Discussion on the challenges and potential solutions in cybersecurity
- Discussion on the impact and potential risks of AI in cybersecurity
- Conclusion and final thoughts
Takeaways
Takeaway 1: Security should be a core part of software development
In the increasingly digitized world, application security is a crucial part of any organization’s cyber strategy. According to Brittany Greenfield, 9 out of 10 breaches begin due to defects in code. The conversation emphasized the importance of building security measures into the software development life cycle from the start.
Greenfield explains, “You can’t really have a robust cybersecurity program if you’re only relying on perimeter security because that’s the point when you get breached. Application security is saying, let’s build this more securely.” She further adds, “We don’t build a house, tell everybody to move in and say don’t worry, we’ll check and see if it’s safe later.”
The discussion highlighted the need to prioritize vulnerabilities – not every issue can be fixed, but it’s about identifying what must be fixed now, what can be fixed later, and what just needs to be monitored in case the risk profile changes.
Takeaway 2: AI and cybersecurity: Opportunities and challenges
Artificial Intelligence (AI) is making its mark in the cybersecurity landscape. While AI can be a force multiplier, helping to manage large data sets and automating processes, it also presents new challenges in the form of sophisticated fraud and the potential for increased vulnerabilities.
Greenfield observes, “AI and cybersecurity is nothing new because of the large data sets that cyber has always generated, it’s always been a really fertile testing ground for AI.” She further adds, “AI can really help…it’s really going to be a force multiplier in the cybersecurity industry to say, hey, you know, it’s what we were just talking about some of what we do, right?”
However, she warns of the dangers of AI, stating, “It’s easier for AI to make a fake Dan, whether it’s your voice or your picture…before somebody can catch it.” She suggests companies should manage AI with caution and common sense.
Takeaway 3: The importance of risk management in software development
In the realm of software development, risk management is paramount. Greenfield stresses the importance of considering an organization’s unique risk profile rather than assuming that a vendor’s security measures will suffice. She also highlights the often-overlooked human component of security.
Greenfield states, “Do not assume that your risk profile is the same as your neighbors and that’s really what it is.” She further explains, “This could all happen overnight, right…You could argue that maybe I don’t haven’t watched it yet because I know too, too closely how this could happen.”
Greenfield’s discussion offers a reminder that while technology continues to evolve rapidly, the human element remains a critical factor in managing and mitigating security risks.
Insights surfaced
- It’s crucial to include security in software development, as 9 out of 10 breaches begin due to defects in code.
- Developers need to understand the importance of security and prioritize fixing vulnerabilities in their code.
- Wabbi is a cybersecurity SaaS platform that translates security from development and vice versa, providing a platform for two parties that wouldn’t meet otherwise to connect.
- AI is both a potential risk and a helper in cybersecurity. It can make social engineering easier, but it can also help manage the large data sets generated in cybersecurity.
- The rapid evolution of technology is leading to a world where art imitates life, and vice versa, especially in the realm of cybersecurity.
Key quotes
- “We don’t build a house, tell everybody to move in and say don’t worry, we’ll check and see if it’s safe later. None of us would go into a building if we did that.”
- “We translate security from development and development back into security.”
- “The Japanese concept of wabi-sabi says let us accept the imperfection in things as a step towards enlightenment.”
- “The industry has accepted that you can really only fix about 5% of vulnerabilities that you have in a given month.”
- “AI and cybersecurity is nothing new because of that, The large data sets that cyber has always generated, it’s always been a really fertile testing ground for AI.”
- “It’s not that you have to build perfect security, but you know, this is also why you’re more likely actually to see a small business attack. That’s where most of the breaches and payouts come from, because they know that they let their guard down.”
Find out how you can bridge the gap between security and development once and for all.
Related Articles

Maximizing ROI: The Strategic Advantage of AppSec Orchestration
Maximizing ROI: The Strategic Advantage of AppSec Orchestration Cybersecurity teams have long faced a dilemma: how do you measure success when the best outcome is that nothing goes wrong? Traditional ROI models don’t apply cleanly to security—until you introduce...

Balancing Act: Integrating Security Seamlessly into User Experience
Balancing Act: Integrating Security Seamlessly into User Experience In today’s hyper-connected world, users expect seamless digital experiences—fast, intuitive, and secure. Yet for many organizations, the traditional tug-of-war between security and user experience...

Why Process Must Come Before Products in DevSecOps
Why Process Must Come Before Products in DevSecOps One foundational principle that’s often overlooked in the race to adopt DevSecOps is prioritizing process over products. While many organizations focus on selecting the right tools, The real key to DevSecOps success...

Why Dev Sec Ops Is the Key to Preventing Cybersecurity Risks
In today’s hyperconnected world, cybersecurity isn’t a nice-to-have — it’s a necessity. Yet, for many organizations, security is still an afterthought in the software development process. In a recent podcast interview, Brittany Greenfield, Founder and CEO of Wabbi,...

The Wabbi Wire: What’s the Big Deal about ASPM?
Wabbi Wire: What's the Big Deal about ASPM? Application Security Posture Management (ASPM) is more than just another security acronym—it’s the key to turning DevSecOps from a buzzword into a business enabler. The challenge? Security and development teams often speak...

AI and DevSecOps : Empowering the Workforce
AI and DevSecOps: Empowering the Workforce The cybersecurity industry is at a pivotal moment, facing a confluence of challenges, from a growing talent shortage to the increasing complexity of threats. Artificial Intelligence (AI) has emerged as both a solution and a...

DevSecOps in Digital Transformation
Click below to listen to this episode of Digital Shifts aka Corporate Evolution Tales, where host Mariam sits down with Brittany Greenfield, founder and CEO of Wabbi, to discuss how to align security with business goals, and why transformation is a continuous...

Building A Secure SDLC to Make DevSecOps a Daily Habit
Building a Secure SDLC to Make DevSecOps a Daily Habit In a world where security and development teams juggle countless priorities, building a secure SDLC must not take a backseat. It is not a luxury or an add-on but a fundamental practice that development...

The Hidden Risks: Internal Failures in Security by Design
The Hidden Risks: Internal Failures in Security by Design When we think about cybersecurity breaches, external attackers often come to mind—hackers, malware, and cybercriminals targeting organizations from the outside. However, breaches can also stem from within,...

Tech Deep Dives: DevSecOps Secrets
Click below to listen to this episode of Kabir's Tech Dives, where host Kabir sits down with Brittany Greenfield, founder and CEO of Wabbi, to discuss how Wabbi is revolutionizing application security, the role of cybersecurity in development, and why modern...

Wabbi Announces General Availability of its Advanced Application Security Risk Index Enabling Risk-Management-by-Design
BOSTON / Press Release / February 21, 2024 Wabbi, the leader in Application Security Posture Management (ASPM), today announced the general availability of its Advanced Wabbi Risk Index. The Application Security Risk Index is a key component of Wabbi’s...

Wabbi Announces Phil Lawrence as New CTO to Spearhead Next Generation Application Security Posture Management Platform
BOSTON, MA, USA / November 20, 2023 /Originally Published at EINPresswire.com Industry leading ASPM provider, Wabbi, has appointed Phil Lawrence as CTO to lead product vision and growth in this high-demand cybersecurity space. Today, Wabbi (www.wabbisoft.com), the...

Wabbi Founder & CEO, Brittany Greenfield, Named 40 under 40
BOSTON, MA, USA / August 16, 2023 Brittany Greenfield, CEO & Founder of Wabbi, the leading ASPM platform, has been named to Boston Business Journal's prestigious 40 Under 40 list for 2024. This annual award honors 40 outstanding professionals under the age of 40...

Wabbi Named in Three Gartner® Reports as ASPM Sample Vendor
BOSTON, MA, USA / August 1, 2023 For more information on Wabbi's Application Security Posture Management platform, visit https://wabbisoft.com. Wabbi, a leading provider of Application Security Posture Management (ASPM) solutions, is pleased to announce that it has...

WABBI NAMED IN 2023 GARTNER® HYPE CYCLE FOR APPLICATION SECURITY REPORT AS AN ASPM SAMPLE VENDOR
BOSTON, MA, USA / July 25, 2023 / Originally Published at EINPresswire.com/ Wabbi, the leading Application Security Posture Management (ASPM) platform, today announced that it has been recognized as a Sample Vendor for Application Security Posture Management (ASPM) in...

Wabbi Named in 2023 Gartner® How to Select DevSecOps Tools for Secure Software Delivery Report as an ASPM Sample Vendor
BOSTON, MA, USA / June 14, 2023 /Originally Published at EINPresswire.com Wabbi announces its inclusion in the 2023 Gartner® How to Select DevSecOps Tools for Secure Software Delivery report as an Application Security Posture Management (ASPM) sample vendor. Gartner®...

Wabbi Unlocks the Secret to Enterprise Secrets Management
Wabbi unveils new Secrets Mangement solution as part of their leading application security posture management and orchestration platform. BOSTON, MA, USA / May 17, 2023 /Originally Published at EINPresswire.com Today, Wabbi, a leader in Application Security Posture...

Wabbi Named to CyberTech 100 for Leadership in Application Security Posture Management & Orchestration for Financial Institutions
BOSTON, MA / May 11, 2023 / EINPresswire.com Wabbi, the leading application security posture management & orchestration company, announced today that it has been named in the CyberTech100 list for 2023. Sponsored by FinTech Global and now in its fourth year, the...

Wabbi Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2023
Wabbi Wins Editor’s Choice for DevSecOps in 11th Annual Global InfoSec Awards at #RSAC 2023 SAN FRANCISCO/ Press Release / April 24, 2023 Wabbi is proud to announce we have won the following award(s) from Cyber Defense Magazine (CDM), the industry’s leading electronic...

Wabbi enables Risk Management by Design with Release of Next-Gen Vulnerability Management in Release 23.1
BOSTON / Press Release / March 27, 2023 Wabbi, the leading provider of Application Security Orchestration & Correlation, announced today the launch of their next-generation vulnerability management solution. With this new offering, Wabbi is now the only tool that...

Why Process Must Come Before Products in DevSecOps
Why Process Must Come Before Products in DevSecOps One foundational principle that’s often overlooked in the race to adopt DevSecOps is prioritizing process over products. While many organizations focus on selecting the right tools, The real key to DevSecOps success...

Why Dev Sec Ops Is the Key to Preventing Cybersecurity Risks
In today’s hyperconnected world, cybersecurity isn’t a nice-to-have — it’s a necessity. Yet, for many organizations, security is still an afterthought in the software development process. In a recent podcast interview, Brittany Greenfield, Founder and CEO of Wabbi,...

AI and DevSecOps : Empowering the Workforce
AI and DevSecOps: Empowering the Workforce The cybersecurity industry is at a pivotal moment, facing a confluence of challenges, from a growing talent shortage to the increasing complexity of threats. Artificial Intelligence (AI) has emerged as both a solution and a...

Building A Secure SDLC to Make DevSecOps a Daily Habit
Building a Secure SDLC to Make DevSecOps a Daily Habit In a world where security and development teams juggle countless priorities, building a secure SDLC must not take a backseat. It is not a luxury or an add-on but a fundamental practice that development...

The Hidden Risks: Internal Failures in Security by Design
The Hidden Risks: Internal Failures in Security by Design When we think about cybersecurity breaches, external attackers often come to mind—hackers, malware, and cybercriminals targeting organizations from the outside. However, breaches can also stem from within,...

Behind Closed Doors: What AppSec Leaders Are Really Thinking About DevSecOps in 2025
Recently, I had the opportunity to sit down with a group of AppSec leaders for a closed-door conversation about their 2025 DevSecOps strategy. No vendors. No slides. Just candid discussions about the challenges they’re facing, what’s working, and what’s keeping them...

Secure SDLC: Turning Speed Into Efficiency to Mitigate Tech’s Greatest Vulnerability
In a world where technology drives nearly every aspect of our personal and professional lives, it’s no surprise that speed is often seen as the ultimate metric of success. Companies race to deliver new features, patch vulnerabilities, and launch products as quickly as...

Tackling Dev Sec Ops in 2025: A Practical Path Forward
The misconception of DevSecOps as a collection of tools or isolated practices has held back its true potential. In 2025, the shift will be about embedding security within every phase of development—not as an interruption, but as an enabler of efficient, secure...

Why AppSec Orchestration Delivers ROI for Dev, Sec & Ops Teams
Building Tangible ROI Through Dev Sec Ops Investments Historically, it has been tough to justify the ROI of cybersecurity investments because cybersecurity success often means nothing happened: no breaches, data losses, or compliance failures. This “absence of...

Building Good Application Security Hygiene
In today’s fast-evolving tech landscape, application security (AppSec) hygiene is an essential factor for every business handling data. AppSec hygiene entails establishing thorough security processes, understanding risks, and ensuring that security protocols are...