API Security

Connect with Wallarm at RSA 2023

We’re looking forward to seeing you at this year’s RSA Conference! Don’t forget to set up a meeting with our executives, as they would love to hear more about your team’s application security needs and chat with you about how Wallarm can help.

Visit Us at Booth #6585 in the North Expo Hall

Wallarm is excited to connect with our friends in the app and API security community at this year’s RSA Conference. Stop by for the in-person Wallarm experience – there’s something for everyone. 

Expo Dates / Times:

  • Monday, April 24th: 5:00 – 7:00 pm
  • Tuesday, April 25th: 10:00 am – 6:00 pm
  • Wednesday, April 26th: 10:00 am – 6:00 pm
  • Thursday, April 27th: 10:00 am – 3:00 pm

Book an in-booth demo

Security Leaders: Meet with Wallarm Executives

It can be tough to have a good conversation on the show floor, so we’re opened up time for 1:1 conversations with our experts just a short walk from Moscone.

Book some time today to learn more about securing your entire app and API estate to prioritize risks and achieve compliance.

Request a meeting

Wallarm Hosted Party on Tuesday!

When it’s time to play, join us at a Cocktail Reception on Tuesday (04/25) between 5:30 pm and 10:00 pm at the Cordial Bar just a few steps away from the Moscone Center. 

The Cordial Bar
Tuesday, April 25, 2023
5:30 pm to 10:00 pm

A big shout-out to the co-sponsors of this event: Microsoft Security, D3, and Elastic!

Register here

Security Leaders: Dine with Us on Wednesday

On Wednesday (04/26) we will bring together a forward-thinking group of security leaders to eat, drink and discuss the security challenges of 2023. We expect a dynamic exchange of ideas and best practices for building or accelerating API and application security programs.

The Vault Steakhouse
Wednesday, April 26, 2023
7:00 pm to 10:00 pm

Request a invite

Just Try Wallarm

Not going to RSA this year? With our free, no-obligation 30-day trial, you can take action now to strengthen your application security program. See for yourself how you gain full visibility into your application and APIs estate in minutes and get real-time detection/mitigation with scalable cloud-native deployment.

Try now

Recent Posts

Everyone Knows About Broken Authorization – So Why Does It Still Work for Attackers?

Broken authorization is one of the most widely known API vulnerabilities.  It features in the…

5 days ago

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse.  Over the past few years, organizations have scaled…

2 weeks ago

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen…

3 weeks ago

CISO Spotlight: Craig Riddell on Curiosity, Translation, and Why API Security is the New Business Imperative

It’s an unusually cold winter morning in Houston, and Craig Riddell is settling into his…

3 weeks ago

The Myth of “Known APIs”: Why Inventory-First Security Models Are Already Obsolete

You probably think the security mantra “you can’t protect what you don’t know about” is…

4 weeks ago

Why API Security Is No Longer an AppSec Problem – And What Security Leaders Must Do Instead

APIs are one of the most important technologies in digital business ecosystems. And yet, the…

1 month ago