Phoenix Security Features – March 2025

Phoenix Security is excited to announce a series of new enhancements and features in our Application Security Posture Management (ASPM) and cloud security engines. This update is packed with crucial advancements in various areas of our platform, ensuring a more robust management of application security and vulnerabilities.

Previous Features

Key Updates in Application Security Posture Management (ASPM)

  1. New Weighted Asset Risk Formula: We’ve introduced a refined Asset Risk aggregation formula that better balances mathematical precision and intuitive risk assessment. You can adjust and even remove the vulnerabilities in the overall reporting metrics. The new weighted average risk formula allows users to tailor risk levels to their specific needs, enhancing our ASPM capabilities.
  2. Auto-approval of Risk Exceptions: To streamline the mitigation process, Phoenix now allows security specialists to auto-approve risk mitigation requests, reducing redundancy and speeding up response times to critical vulnerabilities.

What’s coming:

  • Container Lineage and a more detailed view of which image runs where and which vulnerability can be skipped
  • Threat Centric view of vulnerabilities with the first AI agent to provide a detailed analysis of the vulnerability and the threats affecting your system
  • Cyber threat intelligence premium with more than 128000 Exploits to enhance the Exploitability and fixability metrics (available in preview for professionals and already included for enterprise customers)
  • Exceptions workflows to write exceptions at scale

Summary of all the other updates

  • ASPM
    • Enhanced Impact and Risk Explorer
    • Business Unit Insights within Dashboard
  • Asset and Vulnerability Management:
    • Link findings to existing GitHub and ServiceNow tickets for streamlined workflows.
    • Multi-finding ticketing for Azure DevOps.
    • Selection of Ticket Project for Linking Findings.
    • Filter findings by business units, exclusion conditions, CWE codes, and ownership.
    • Search assets by deployment environment.
  • Integrations:
    • Enhanced Lacework container management for improved scanner reports.
    • REST API now supports asset tags for streamlined deployments.
  • Other Components:
    • Added CVE and CWE columns for better comparison.
    • Improved custom status management for findings.

We are sure that you’ll find these quite interesting!

Application Security Posture Management

  1. Enhanced Impact and Risk Explorer: Navigate the complexities of organizational risk with our Impact and Risk Explorer side panel.
  2. Buisness Unit Insights within Dashboard: We’ve enhanced our risk explorer to segregate branches of vulnerabilities by business units to easily monitor organizational impact.

Asset and Vulnerability Management

  1. Link Findings to Existing Tickets for GitHub and ServiceNow: Streamline remediation workflows by integrating with GitHub and ServiceNow. This extension allows users to link findings to existing tickets with complete flexibility.
  2. Multi-Finding Tickets for ADO: Simplify workflow management with the two-level ticketing configuration model, now available for Azure DevOps.
  3. Selection of Ticket Project for Linking Findings: Manually select any project to link findings to existing tickets, bypassing restrictions and enhancing flexibility in vulnerability management.
  4. Business Unit Filter: Categorize vulnerabilities by business units for more organized and targeted filtering of risks.
  5. Exclusion Filtering: Filter findings based on “Any” aswell as “All” conditions, enhancing triaging capabilities and reducing the complexity of vulnerability management.
  6. CWE-Based Filtering: Quickly locate findings associated with specific Common Weakness Enumeration (CWE) codes for more effective remediation.
  7. Owner-Based Filtering: Prioritize findings based on Application and Environment ownership or monitor other users’ findings for improved team management.
  8. Filter by “Deployed in Environment” for All Assets: Search for assets deployed in specific environments with this filter, available in the “All Assets” section.

Integrations

  1. Enhanced Lacework Container Management: Fetch running container information or container images depending on asset type selection through Lacework integration, enhancing scanner integration reports.
  2. REST API Enhanced to Use Asset Tags for Deployments: Deploy components using service asset tags, streamlining the deployment process.

Other Components

  1. Added CVE and CWE Columns to Findings and Vulnerabilities: Easily compare and target findings with specific CVEs and CWEs, enhancing contextual understanding.
  2. Improved Finding’s Custom Status Management: Define custom status tags for next level customisation through the Custom Status Configuration panel.

Get in control of your Application Security posture and Vulnerability management


Revolutionizing Security Posture Management with Phoenix Security

Quick access Insights Panel 

New Impact and Risk Explorer side panel: We’ve made assessing impact easier than ever before. The new Insight Intelligence panel allows you to reveal the blast radius of specific findings, vulnerabilities and assets. This is the side panel that opens on the Findings, Vulnerabilities and Assets pages when you click the new “bulb” icon on the top-right to open a series of heatmaps and an impact breakdown table.

Explore areas affected using the business impact tab to visualise how vulnerabilities are distributed across different business units and empower yourself to take action faster. Peel back layers of vulnerability on the heatmap by clicking on different business units to reveal apps and environments affected; click further and pinpoint specific components affected using risk score metrics.

For a more comparative visualisation of applications and risk profiling, the Affected applications and environments table is the place to look. This expandable data table with nested groupings accommodates contextual risk exposure analysis using risk metrics columns such as: Vulnerabilities (scale), Average Risk score, Risk Magnitude score. For ease of navigation there are even shortcuts accessible by clicking the icons on the right of each application or environment entry. For example, by clicking on the diamond icon a shortcut will be executed to take you to the asset page with this business unit pre-filtered.

Assessing team impact is essential to maintain a stable security posture, which is why we have included a team impact heatmap to visualize team security posture and assess associated risk metrics.

Business Unit Insights Now Built Into Your Dashboard

Enhanced Impact and Risk Explorer: Prioritise what matters most using the enhanced Impact and Risk Explorer. We’ve enhanced our risk explorer to segregate branches of vulnerabilities by business units to easily monitor organizational impact. The size of each business unit is proportional to its impact/criticality to ensure business units are adequately visualized according to the scale of components affected. Not to worry about neglecting high-risk business units, as colour-coded segregation ensures no vulnerabilities are left unnoticed.

Stay informed, stay in control, and prioritize with precision.

Asset and Vulnerability Management

We’re happy to announce new extensions to our ticketing integration capabilities. With the previous development of being able to link findings to existing tickets, Phoenix security has now expanded the collection of ticketing platforms for which this feature is available – you can now use GitHub and ServiceNow to streamline remediation workflows with complete flexibility. 

Multi-finding tickets for ADO

The two-level ticketing configuration model offers flexible control by allowing you to associate entire applications and environments with a specific project while seamlessly enabling granular exceptions to be configured at the component level. Enabling multiple findings to be assigned to one ticket introduces a reduced workflow complexity by allowing users to customize ticketing groups in ways that are specific to their workflow methods. The introduction of multi-finding tickets for Azure DevOps elevates customization possibilities to an even greater extent.

Allow selection of ticket project when linking findings to existing tickets

The Phoenix security ASPM platform is continuously being enhanced to optimise flexibility and reduce workload. The ticketing system just got even better with the flexibility to choose any project to link an existing ticket to. This mechanism ensures that in exceptional cases, where a finding needs to manually be assigned to an existing ticket that is not in the project associated with the Application or Component, that users can choose which integration and project to use to select the target ticket.

Users are no longer restricted to link findings to tickets in the project configured for the Application or Component! We have bypassed this process to make the workflow more flexible and Vulnerability management quicker than ever!

New Business Unit Filter

Phoenix Security has always offered a powerful set of filtering capabilities for findings. With the introduction of the all new Business Unit categorization we have integrated this as a filter category to allow organizational risk to be filtered with ease. Filtering capabilities at Phoenix are ever growing with the consistent introduction of new features and ways to categorise vulnerabilities. Filtering Vulnerabilities, assets and Findings by business unit allows you to search for findings in a conventional way that segregates findings in a more organizational business manner.

Exclusion Filtering just got better

At Phoenix Security, we never fail to introduce advanced features to enhance your triaging capabilities. The Excluded Options extension within the filter side panel provides extended functionality for filtering detailed findings and vulnerabilities. By pressing the blue tab on the right side of the screen, you will reveal an alternate filtering menu to exclude specific categories. This now includes the option to add exclusion filters that match findings that match Any condition, as well as All conditions. The “All” feature acts as an AND, excluding a finding only if all exclusion filters have been met; this was the previous behaviour. The “Any” feature, on the other hand, acts as an OR, excluding a finding if at least one of the conditions is matched.

New CWE-Based Filtering

As Phoenix Security is under continuous improvement of our vulnerability management capabilities, Phoenix now allows users to quickly search for findings that are linked to specific CWEs. This streamlines the process of locating specific findings with known vulnerabilities and remediations by using Common Weakness Enumeration codes, bridging the gap between different security team vulnerability classification standards by providing an abundance of filters to choose from.

New Owner Based Filtering

With the all new Application and Environment Owner filter you can prioritise findings based on apps assigned to you or even monitor other user’s findings to keep on top of your team and prioritize what matters. You can select one or multiple users to customize your filtering, this feature is even available in the exclusion filtering section for advanced filter configuration. 

Filter by “Deployed in Environment” for All Assets

Phoenix Security is dedicated to ensuring that everyday tasks are as efficient and straightforward as possible. To accomplish this goal, filtering capabilities are continuously being expanded and enhanced to consider every scenario where a specific vulnerability needs to be found, reducing the cognitive load of manually scanning for specific features. To make searching for assets deployed in a specific environment as straightforward as possible, we have included this as a filtering option in the “All Assets” section of the “Assets” panel.

This filter is only available in the All Asset page, since it aims to select assets from the Components (software) and Services (containers, runtime) that are linked by deployment. The other asset screens are dedicated to specific types of assets, and they can’t display this combination of types.

Integrations

Enhanced Lacework Container Management

At Phoenix Security we have an expansive selection of compatible scanner integrations, allowing you to get the most out of our software no matter what your scanning preferences are. We are dedicated to ensuring that as scanners release new features, we keep in sync with these advancements and accommodate the latest improvements in our software. This is why we have included asset type selection into our Lacework integration configuration to enable the syncing of currently running container information depending on your asset type selection. Not only will this release allow you to fetch running container information but also container images to expand your capabilities by providing in-depth scanner integration reports.

REST API enhanced to use asset tags for Deployments

Component deployment has never been so easy. Phoenix Security has introduced a new feature in the REST API which allows you to select a Service to deploy to not just using the service’s own tags, but also allows you to use the service assets’ tags for selection. Tags are essential for teams to track and classify findings in their own ways and with this new feature it couldn’t be easier.

Others Enhancements

Added CVE and CWE columns to Findings and Vulns

Phoenix Security’s ASPM platform always prioritizes what is displayed based on years of experience in the industry and relevance to the given situation. That’s why we have added the CWE column to the vulnerability table to ease searching for specific vulnerabilities, not just by using the filtering option. Sometimes, filtering for specific CWEs can blind you from the complete picture, as similarities can easily be spotted using the table and used to contextualize the problem, whereas filtering can narrow down your options and make it harder to draw links.  

To ensure CVEs are not overlooked, we have added this column to the findings sub-table within a vulnerability to allow for easy comparison and targeting of findings with specific CVEs. The CVE for a specific vulnerability can also be found within its vulnerability ID.

Improved findings Custom Status management

Custom status management offers more flexibility and alignment with your internal security processes by providing the option for users to define customized status tags for findings. Users can define status tags in the Custom Status Configuration panel within the Settings > Organisation section, and they can now safely delete previously defined tags. To ensure complete customization, even when a finding has been marked as a false positive or mitigated, users can set custom statuses in these circumstances — enabling precise organisation for closed tickets.

Get in control of your Application Security posture and Vulnerability management

Alfonso brings experience running international teams for multi-million dollar, technologically advanced projects for Telefónica, IBM and Vodafone. Alfonso joins with two decades of experience working for tech leaders, including at Dell EMC, Yahoo! and Intershop.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Learn how to predict ransomware risks and vulnerability exploitation using a threat-centric approach. Explore data-driven insights, verified exploit trends, and methods for assessing the likelihood of attacks with key references to CISA KEV, EPSS, and Phoenix Security’s 4D Risk Formula.
Francesco Cipollone
Remote Code Execution flaws continue to undermine Kubernetes ingress integrity. IngressNightmare (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) showcases severe threat vectors in NGINX-based proxies, leading to cluster-wide exposure. ASPM, robust remediation tactics, and strong application security solutions—like Phoenix Security—mitigate these vulnerabilities before ransomware groups exploit them.
Francesco Cipollone
Remote Code Execution flaws continue to undermine Kubernetes ingress integrity. IngressNightmare (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) showcases severe threat vectors in NGINX-based proxies, leading to cluster-wide exposure. ASPM, robust remediation tactics, and strong application security solutions—like Phoenix Security—mitigate these vulnerabilities before ransomware groups exploit them.
Francesco Cipollone
The recent Google acquisition of Wiz for $32 billion has sent shockwaves through the cybersecurity industry, particularly in the realm of Application Security Posture Management (ASPM). This monumental deal highlights the critical importance of cloud security and the growing demand for robust ASPM solutions. While the acquisition promises potential benefits for Google Cloud users, it also raises concerns about vendor lock-in and the future of cloud-agnostic security. Explore the implications of this acquisition and discover how neutral ASPM solutions like Phoenix Security can bridge the gap in multi-cloud environments, ensuring continuous, collaborative, and comprehensive security from code to cloud.” – Find Assets/Vulns by Scanner – Detailed findings Location information Risk-based Posture Management – Risk and Risk Magnitude for Assets – Filter assets and vulnerabilities by source scanner Integrations – BurpSuite XML Import – Assessment Import API Other Improvements – Improved multi-selection in filters – New CVSS Score column in Vulnerabilities
Alfonso Eusebio
The team at Phoenix Security pleased to bring you another set of new application security (ASPM) features and improvements for vulnerability management across application and cloud security engines. This release builds on top of previous releases with key additions and progress across multiple areas of the platform. Application Security Posture Management (ASPM) Enhancements • New Weighted Asset Risk Formula – Refined risk aggregation for tailored vulnerability management. • Auto-Approval of Risk Exceptions – Accelerate mitigation by automating security approvals. • Enhanced Risk Explorer & Business Unit Insights – Monitor and analyze risk exposure by business units for better prioritization. Vulnerability & Asset Management • Link Findings to Existing Tickets – Seamless GitHub, ServiceNow, and Azure DevOps integration. • Multi-Finding Ticketing for ADO – Group multiple vulnerabilities in a single ticket for better workflow management. • Filter by Business Unit, CWE, Ownership, and Deployment Environment – Target vulnerabilities with precision using advanced filtering. Cyber Threat Intelligence & Security Enhancements • Cyber Threat Intelligence Premium – Access 128,000+ exploits for better exploitability and fixability metrics. • SBOM, Container SBOM & Open Source Artifact Analysis – Conduct deep security analysis with reachability insights. • Enhanced Lacework Container Management – Fetch and analyze running container details for better security reporting. • REST API Enhancements – Use asset tags for automated deployments and streamline security processes. Other Key Updates • CVE & CWE Columns Added – Compare vulnerabilities more effectively. • Custom Status Management for Findings – Personalize security workflows with custom status configurations. • Impact & Risk Explorer Side Panel – Gain heatmap-based insights into vulnerability distribution and team risk impact. 🚀 Stay ahead of vulnerabilities, optimize risk assessment, and enhance security efficiency with Phoenix Security’s latest features! 🚀
Alfonso Eusebio
Discover CVE-2025-30066 tj-actions/changed-files GitHub Action has been compromised, exposing secrets in CI/CD pipelines and posing a major software supply chain security risk. Attackers injected malicious code into all versions (V1–V45), repointing existing tags to a compromised commit that exfiltrated credentials via GitHub Actions logs. Immediate remediation is required—organizations must scan their repositories, rotate secrets, and replace the action to mitigate risk. Learn how Phoenix Security’s ASPM can automate threat detection and enhance GitHub Actions security.
Francesco Cipollone
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO