Categories: Wallarm News

Wallarm to Sponsor AppSec Cali

If you are a SecOps or DevOps professional on the west coast you can not miss the premier California application security event: AppSec California, January 22–25th in Santa Monica.

Here are testimonials from the previous AppSec Cali events:

“I'm looking forward to AppSecCali next week. Last year was awesome. This year looks even better!” — @jeremiahg

“I think AppSecCali was one of the best conferences I have been to. Talks were good. Venue was awesome and atmosphere was really chilled out #thanks” — @abhaybhargav

“On the way out to SoCal for AppSecCali, one of my favorite conferences every year. Looking at the lineup of talks I trust this one won’t disappoint! #AppSecCali #owasp #CyberSecurity” — @HolyCyberBatman

“If you believe that learning security is not cool, #AppSecCali will change your mind.” — @ericbaize

Among well-known speakers in the Application Security and OWASP community, such as Adam Shostack, Kevin Gosschalk, Christina Kubecka, Caleb Queern, and Jason Haddix, Wallarm co-founder, Stepan Ilyn will be giving Lightning Talk: Building Cloud-Native Security for Apps and APIs with NGINX

Also, listen to the latest Advancing Security podcast episode where Stepan shares some of his insights into cloud security: https://buff.ly/2FHgytQ

When at the event, make sure to stop by Wallarm table to learn about the Wallarm products, play corn bags and take part in the raffle.

Wallarm’s Plant a Tree Donation Program

Wallarm is dedicated to securing a brighter future for all Californians. And we’d like to include you in our initiatives!

The Plant a Tree program works to restore the 3+ million acres lost during the 2017–2018 California wildfires. By joining the program you become an integral part of strengthening the Californian ecosystem.

Register to help restore greener California and visit us while at AppSec Cali.

Tags: Hacker News

Recent Posts

CISO Spotlight: Dimitris Georgiou on Building Security that Serves People First

Dimitris Georgiou has been a self-professed computer geek since the early 80s. At university, he…

2 weeks ago

The CISO’s Dilemma: How To Scale AI Securely

Your board wants AI. Your developers are building with it. Your budget committee is asking…

1 month ago

Agent-to-Agent Attacks Are Coming: What API Security Teaches Us About Securing AI Systems

AI systems are no longer just isolated models responding to human prompts.  In modern production…

1 month ago

Everyone Knows About Broken Authorization – So Why Does It Still Work for Attackers?

Broken authorization is one of the most widely known API vulnerabilities.  It features in the…

1 month ago

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse.  Over the past few years, organizations have scaled…

2 months ago

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen…

2 months ago