Discover the latest studies from the Phoenix Security team on application security, prioritization and Cloud security. Discover the latest case studies, datasheets and knowledge materials to conquer your vulnerability management programs.
LLM application to a Threat Centric Approach on Vulnerability
SLA are dead long live SLA – Data driven approach on Vulnerabilities
Building Resilient Application and cloud security programs
NIS2 Regulation – Impact on Vulnerability Management
Vulnerability maturity model and how to implement application security and vulnerability management at scale
DORA 2 Upcoming regulation on Critical resilience for Banking and Fintech
Building Application & Cloud security programs
Vulnerability Management at scale & the power of context-based prioritization
Tech-sheet
Datasheet
E-book
Getting started video tour
Listen to the latest Phoenix Security podcast
Get Started with Phoenix Security
Read the latest Phoenix Security news
Read the latest Blogs
Discover our events
Explore the talks
Discover Whitepapers
Read the latest News
Discover video resources
More than 1000 Users and 350 Organizations trust us