blog

Appsec Phoenix is Now Phoenix security – contextual-based vulnerability prioritization from code to cloud.

AppSec Phoenix is now Phoenix Security

The evolution and reborn of the phoenix

We initially chose the phoenix as a symbol of renewal and reborn; the phoenix platform has evolved from appsec cloudsec complete endpoint management.

As our second year comes to a close, we decided to evolve the name as the platform has massively evolved from the original release in September 2022. With the imminent launch of V3 we wanted an evolved name to cover all the functionalities that the platform and us can do for our clients

Now that the platform covers all those areas identifying vulnerabilities from code to cloud, we thought it appropriate to evolve the name,

From Appsec Phoenix to Phoenix Security

From appsec Phoenix, we evolve into Phoenix security, a unified platform covering code to cloud with vulnerability prioritization and traceability of user fixing. 

We maintain the same philosophy of cyber risk quantification, risk-driven action and vulnerability prioritization.

Why phoenix security?

We choose phoenix security as a community experiment, including the domain name. 

Many voted across multiple platforms to make this name happen. 

We believe in the power of community, and what people love, so we let the community decide on the name. 

The world has changed.

Cloud and DevOps have shifted how applications and software are built. 

Open-source and no-code have changed the speed and time it takes to create software.

In the same way, the Cloud and Containers have changed how software is run. 

In all this landscape change, we are still trying to address vulnerabilities in the same antiquated ten-year-old method, with manual triage and manual assessment calls. What’s the result? Security teams are drowning in a sea of red/critical alerts that are un-contextualised and spending time arguing with businesses on all the problems that need to be solved. The business leaders don’t speak the vulnerability language and only understand risk and the money spent to reduce risk. 

Now is the time for a paradigm shift and to tear down the language barriers. 

Where you can find everything:

We choose a new name and domain in the .security domain space phoenix.security is our new home. We will maintain as well the appsecphoenix.com and securityphenix.com as secondary domains

Where can you find the resources

Demo: 

Whitepapers:

The app will be reachable at

Securityphoenix.cloud  phenixsecurity.app

Support teams:

Support Slack: https://phoenixsec.slack.com/ 

Support e-mail support at phoenix.security

https://kb.phoenix.security/

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Contextual vulnerability management is a comprehensive approach to identifying, analyzing, and mitigating vulnerabilities in software and cloud infrastructure. It involves considering the specific context and environment in which vulnerabilities exist, including the software and hardware components, the network infrastructure, and the organizational policies and processes in place. By adopting this approach, organizations can more effectively assess and mitigate the risks posed by vulnerabilities, helping to protect their assets and maintain the security of their systems and networks.
Francesco Cipollone
Cyber security risk is challenging to calculate. Real-Time context, Cyber threat intelligence, Ownership Vulnerabilities, all part of the same continuum ->
Alfonso Eusebio
In today’s digital world, cyber threats are a real and growing concern for organizations of all sizes. As the threat landscape continues to evolve. we explore in this blog how to threat treats, which one to use in your prioritization strategy
Sally Turner

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

x Logo: ShieldPRO
This Site Is Protected By
ShieldPRO