Last week Wallarm attended RSA Conference in San Francisco.
Wallarm booth was quite popular all three days of the show. We’ve got to network with over 300 of our current and future customers. We have presented both our next generation WAF product and our upcoming product for CI/CD application testing, Wallarm FAST.

Wallarm has detected hundreds of vulnerabilities just for the companies who signed up for a free trial of the Wallarm vulnerability scanner during the show.

The show was huge. Walking around both parts of the exhibit center (the show was in both North and South concourse of Moscone center) took several hours. We have seen a lot of friendly faces from the companies like #NGINX.

Interestingly, a whole day of the show was devoted to increasing security of DevOps with a specialized event called DevOps connect.

Even though we spent most of our time on the exhibit floor, catching up on the show presentations also provided some interesting insights:

  • Ransome-ware + IOT = some very scary situation. As exemplified by a recent case at San Francisco Trade Authority.
  • Java.util.rando >< MD5 (microtime)?. They are both pretty random number generators. If your developer has used either of them or something similar for PKI, bitcoin or other cryptography, chances are it can be brute-forced.
  • Relation-less databases have vulnerabilities that every bit as nasty as SQL injections.
  • Some example of pretty bad XML vulnerabilities are heard in this talk.

All in all, it was a very good show. If we’ve peaked your interest, most of the keynotes and more content is available on the show website.

We also want to congratulate Prashant at Koh’s who won a quadcopter at Wallarm show ruffle.

Come see us again at the next event!

Recent Posts

Introducing Wallarm Middle East Cloud: Built for Data Residency Compliance

As API and AI adoption grows across the Middle East, so do the expectations around…

5 days ago

6 Lessons Security Leaders Must Learn About AI and APIs

Most organizations treating AI security as a model problem are defending the wrong layer. Security…

2 weeks ago

The Governance Gap: How the EU AI Act Makes API Security a Compliance Imperative

Your legal team just handed you a 400-page document and said "figure out compliance." The…

2 weeks ago

Attacking the MCP Trust Boundary

Every secure API draws a line between code and data. HTTP separates headers from bodies.…

2 weeks ago

Why API Discovery Is the First Step to Securing AI

TL;DR AI risk doesn’t live in the model. It lives in the APIs behind it.…

3 weeks ago

CISO Spotlight: Dimitris Georgiou on Building Security that Serves People First

Dimitris Georgiou has been a self-professed computer geek since the early 80s. At university, he…

1 month ago