Pushing the Boundaries of Vulnerability Management with Phoenix Security’s Latest ASPM UpdatePhoenix Security ASPM – Release 3.26


At Phoenix Security, we’re redefining the landscape of vulnerability management and application security with our latest release. Packed with innovative features and robust integrations, this update lays the foundation for the future of Application Security Posture Management (ASPM). These enhancements make managing security risks faster, smarter, and more effective for modern teams.

Key Highlights of the Release

This update delivers industry-leading features to streamline vulnerability management and improve application security workflows. Here’s what’s new:

Reachability Analysis with Contextual Deduplication (Code to Containers)

Container Throttling and Version Monitoring

Asset-Centric Actions and Lifecycle Management

Enhanced Findings and Asset Details

Flexible Ticketing Across Projects/Backlogs

New Integrations: Sysdig, BlackDuck, and Improved Lacework Integration

These upgrades empower organizations to prioritize vulnerabilities, reduce noise, and align security efforts with business goals.

Join us in revolutionizing cybersecurity management with these innovative features, designed to make your life easier and your organization more secure. Dive into the new Phoenix Security Platform and experience the future of cybersecurity today.

Phoenix Security, Release 3.26, ASPM, Vulnerability Management, Application Security, ASPM


Advancements in ASPM: Contextual Deduplication and Reachability Analysis


Phoenix Security introduces Contextual Deduplication, a game-changer in ASPM and Application Security. This feature enhances Vulnerability management and links vulnerabilities in source code with runtime assets like containers, enabling security teams to focus on fixing the root cause of issues.

How It Works:

• Correlates SCA findings in source code with containers in runtime environments.

• Example: If a pom.xml file introduces a CVE (e.g., CVE-1234-1234) into a container, the platform identifies the source file as the origin of the vulnerability.

Benefits:

• Highlights the root cause to prioritize fixes.

• Increases effective risk scores for source vulnerabilities due to container exposure.

• Avoids redundant fixes in runtime environments by addressing the core issue.

A feature focus is available here

Reachability analysis, Phoenix Security, Contextual Deduplication
Reachability analysis, Phoenix Security, Contextual Deduplication

This is another step forward in empowering security and engineering teams to focus on the most relevant vulnerabilities. In this case, the goal is to highlight the “source code” findings that originate from other findings in runtime assets, in particular in containers.

Now, the platform will automatically identify SCA findings in source code deployed in specific containers and enhance Vulnerability management. This process involves several steps and techniques, but the result is that Phoenix identifies source code artifacts that strongly correlate with the contents of a container and then maps individual finding pairs on both sides.

Phoenix Security, Release 3.26, ASPM, Vulnerability Management, Application Security, ASPM, Contextual deduplication, reachability  analysis

For example, if a build file (e.g. pom.xml) is deployed on a container and both have CVE-1234-1234, then those findings will be matched. This means that the CVE in the container has been introduced through the build file. Typically, one single source artifact is deployed in multiple containers, so the relationship is one-to-many.

This allows the platform to:

  • Highlight the source finding as the originator of the findings in the containers, allowing teams to focus on the root cause.
  • Increase the effective risk of finding the source based on the additional exposure created by the containers.
  • Stop selecting those container findings for fixing since the actual fix needs to be implemented in the source finding.
Phoenix Security, Release 3.26, ASPM, Vulnerability Management, Application Security, ASPM, Contextual deduplication, reachability  analysis

Container Throttling and Single-version management for ASPM


Any security team faces the challenge of managing hundreds of container versions. Phoenix Security’s new container throttling feature tracks only active versions in registries, reducing unnecessary noise and simplifying vulnerability management.

Phoenix Security, Release 3.26, ASPM, Vulnerability Management, Application Security, ASPM, Contextual deduplication, reachability  analysis

This feature enabled us to drastically reduce up to 91% of the container vulnerabilities on one of our clients, keeping track of the latest image version. We are currently working on improving the tracking of vulnerabilities for each container. Together with container reachability analysis we managed to reduce drastically the Open source vulnerabilities /SCA and Container vulnerabilities by 50% and 91% respectively.

A feature focus is available here

Phoenix Security, Release 3.26, ASPM, Vulnerability Management, Application Security, ASPM, Contextual deduplication, reachability  analysis

Lifecycle Management in ASPM by Asset/Vuln Type


Phoenix Security ASPM enhances control over the lifecycle of findings and assets by allowing users to set customized grace periods for each type of vulnerability or asset. This flexibility ensures that all findings are handled effectively within their specific risk contexts.

The feature is particularly key for Vulnerability management teams that manage different types of assets that have different lifecycles, e.g., a laptop might be on and off for months while a container vulnerability might be present and disappearing hundreds of times a da.y

Asset and Vulnerability Management in ASPM

One of Phoenix Security’s ASPM main goals is to make everyday tasks as simple and efficient as possible. That’s why bulk operations on findings and assets have been part of the platform for a long time. This feature allows users to select multiple findings and perform a range of different actions on them, from creating issue tickets to adding comments.

With this release, we bring further enhancements to this area by allowing users to select one or multiple assets or vulnerabilities and perform bulk actions based on the findings contained within them. This allows users to perform those bulk actions without leaving the screen they are working on.

Select Any Project/Backlog to Create Tickets 

The Phoenix Security ASPM platform has always provided a flexible way to configure projects (backlogs) within integrated ticketing systems to enhance the Application security team’s workflow and Vulnerability management. Its two-level configuration model provides enough granularity to associate entire applications and environments with a particular project and to configure exceptions to the top-level setting down to the component level.

This mechanism ensures that new tickets (even when created automatically by the platform) go to the right team’s backlog.

But sometimes users need to deal with exceptional cases or those where the ticketing system’s side is more fragmented. To cover these cases and provide extra flexibility, users can create new tickets on any integration and project already defined in the platform, even if it’s not the one preconfigured for the App or Component.

ASPM from Assets to Improved Findings Details

New column for Libraries

A new column now displays library and version information for each entry in the list. This makes it easier to identify libraries and versions without expanding individual finding entries.

New Due Date / Closed Date column for ASPM

A new dual-purpose column now displays the due date for the findings (based on SLA) or the date when the finding was closed for those that have already been closed.

To avoid confusion, the column’s header displays Due Date for the open findings view, while it displays Closed Date for the closed findings view. If the “All” view is selected the title shows both options, and the date displayed depends on whether the finding is open or closed.

Updated SLA columns

The existing SLA columns have been revamped to enhance Vulnerability management and display more relevant information. Now, the number shown reflects the days left until SLA expiry (in green) or the days the findings are overdue (in red). Moving the mouse over the number will display the SLA applied in each case.

Improved Asset Details in the ASPM lifecycle

Similarly to the findings improvements, this release sports some enhancements released to asset information display.

Display additional asset information.

An important evolution of asset information in Phoenix Security ASPM has revolved around expanding and consolidating asset details. This means more details for all types of assets, including contextual details like cloud information for containers or repositories.

With this release, all asset details, not just those related to the asset type, are included in the Details section.

Additional asset filters

In line with the attribute consolidation mentioned above, now users can filter different types of assets using conditions that are not directly related to the asset type. For example, filtering container assets using “contextual” attributes, like cloud details. Obviously, some of those details will only be present if the container is actually running in a cloud context.

ASPM Integrations

Sysdig Scanner Integration

A new addition to the Cloud scanner lineup included in this release is Sysdig.

Customers using Sysdig as part of their security scanning would be able to integrate with their account using Phoenix’s native API-based integration.

BlackDuck Scanner Integration

In addition to Sysdig, this release includes integration with BlackDuck in the SCA area.

Customers using Sysdig as part of their security scanning would be able to integrate with their account using Phoenix’s native API-based integration.


Get in control of your Application Security posture and Vulnerability management

Alfonso brings experience running international teams for multi-million dollar, technologically advanced projects for Telefónica, IBM and Vodafone. Alfonso joins with two decades of experience working for tech leaders, including at Dell EMC, Yahoo! and Intershop.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Learn how to predict ransomware risks and vulnerability exploitation using a threat-centric approach. Explore data-driven insights, verified exploit trends, and methods for assessing the likelihood of attacks with key references to CISA KEV, EPSS, and Phoenix Security’s 4D Risk Formula.
Francesco Cipollone
Remote Code Execution flaws continue to undermine Kubernetes ingress integrity. IngressNightmare (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) showcases severe threat vectors in NGINX-based proxies, leading to cluster-wide exposure. ASPM, robust remediation tactics, and strong application security solutions—like Phoenix Security—mitigate these vulnerabilities before ransomware groups exploit them.
Francesco Cipollone
Remote Code Execution flaws continue to undermine Kubernetes ingress integrity. IngressNightmare (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) showcases severe threat vectors in NGINX-based proxies, leading to cluster-wide exposure. ASPM, robust remediation tactics, and strong application security solutions—like Phoenix Security—mitigate these vulnerabilities before ransomware groups exploit them.
Francesco Cipollone
The recent Google acquisition of Wiz for $32 billion has sent shockwaves through the cybersecurity industry, particularly in the realm of Application Security Posture Management (ASPM). This monumental deal highlights the critical importance of cloud security and the growing demand for robust ASPM solutions. While the acquisition promises potential benefits for Google Cloud users, it also raises concerns about vendor lock-in and the future of cloud-agnostic security. Explore the implications of this acquisition and discover how neutral ASPM solutions like Phoenix Security can bridge the gap in multi-cloud environments, ensuring continuous, collaborative, and comprehensive security from code to cloud.” – Find Assets/Vulns by Scanner – Detailed findings Location information Risk-based Posture Management – Risk and Risk Magnitude for Assets – Filter assets and vulnerabilities by source scanner Integrations – BurpSuite XML Import – Assessment Import API Other Improvements – Improved multi-selection in filters – New CVSS Score column in Vulnerabilities
Alfonso Eusebio
The team at Phoenix Security pleased to bring you another set of new application security (ASPM) features and improvements for vulnerability management across application and cloud security engines. This release builds on top of previous releases with key additions and progress across multiple areas of the platform. Application Security Posture Management (ASPM) Enhancements • New Weighted Asset Risk Formula – Refined risk aggregation for tailored vulnerability management. • Auto-Approval of Risk Exceptions – Accelerate mitigation by automating security approvals. • Enhanced Risk Explorer & Business Unit Insights – Monitor and analyze risk exposure by business units for better prioritization. Vulnerability & Asset Management • Link Findings to Existing Tickets – Seamless GitHub, ServiceNow, and Azure DevOps integration. • Multi-Finding Ticketing for ADO – Group multiple vulnerabilities in a single ticket for better workflow management. • Filter by Business Unit, CWE, Ownership, and Deployment Environment – Target vulnerabilities with precision using advanced filtering. Cyber Threat Intelligence & Security Enhancements • Cyber Threat Intelligence Premium – Access 128,000+ exploits for better exploitability and fixability metrics. • SBOM, Container SBOM & Open Source Artifact Analysis – Conduct deep security analysis with reachability insights. • Enhanced Lacework Container Management – Fetch and analyze running container details for better security reporting. • REST API Enhancements – Use asset tags for automated deployments and streamline security processes. Other Key Updates • CVE & CWE Columns Added – Compare vulnerabilities more effectively. • Custom Status Management for Findings – Personalize security workflows with custom status configurations. • Impact & Risk Explorer Side Panel – Gain heatmap-based insights into vulnerability distribution and team risk impact. 🚀 Stay ahead of vulnerabilities, optimize risk assessment, and enhance security efficiency with Phoenix Security’s latest features! 🚀
Alfonso Eusebio
Discover CVE-2025-30066 tj-actions/changed-files GitHub Action has been compromised, exposing secrets in CI/CD pipelines and posing a major software supply chain security risk. Attackers injected malicious code into all versions (V1–V45), repointing existing tags to a compromised commit that exfiltrated credentials via GitHub Actions logs. Immediate remediation is required—organizations must scan their repositories, rotate secrets, and replace the action to mitigate risk. Learn how Phoenix Security’s ASPM can automate threat detection and enhance GitHub Actions security.
Francesco Cipollone
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO