Five Reasons Why I Joined Wallarm

By Johan Nordstrom

The question of “what made you change jobs?” may be old, but the answer with my move to Wallarm is new and clear. I have a vision how to address the dynamic threat landscape of today and Wallarm’s innovative approach to security is in line with these ideas.

In my 30 years career, I’ve had the pleasure of working with amazing technology companies and talented people around the world, many in security space.

While many of those were fine companies for their time, I feel that the current trends in how software is developed and deployed demand new innovative ways to address the new threat landscape.

This is why I am excited to be joining Wallarm as a Chief Business Development Officer (CBDO).

So, here are my five main reasons for choosing Wallarm:

1. It has great new technology which keeps up with the new speed of agile development and addresses both known and unknown threats

2. It has proven it’s robustness and service quality in the field, with many large cloud and enterprise customers

3. The team has a great vision and an active support group of advisors and VC’s that take part in the company development

4. The company is poised for rapid growth in customers, partners, revenue and number of employees.

5. The global customers who I have worked with would really benefit from machine learning in security technology and I am looking forward to the opportunity to to enable them with this new generation of application security solutions

I am looking forward to many productive experiences in my new Wallarm home.

Recent Posts

The CISO’s Dilemma: How To Scale AI Securely

Your board wants AI. Your developers are building with it. Your budget committee is asking…

1 week ago

Agent-to-Agent Attacks Are Coming: What API Security Teaches Us About Securing AI Systems

AI systems are no longer just isolated models responding to human prompts.  In modern production…

1 week ago

Everyone Knows About Broken Authorization – So Why Does It Still Work for Attackers?

Broken authorization is one of the most widely known API vulnerabilities.  It features in the…

3 weeks ago

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse.  Over the past few years, organizations have scaled…

1 month ago

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen…

1 month ago

CISO Spotlight: Craig Riddell on Curiosity, Translation, and Why API Security is the New Business Imperative

It’s an unusually cold winter morning in Houston, and Craig Riddell is settling into his…

1 month ago