Resources

Cyber Risk
Defenders Club Resources

Discover the latest events, conferences, research from the Phoenix Security team, and collaborative papers from the Cyber Risk Defender Club members
Download all the whitepaper data sheets and conference material.
Time to build better Application Security and Cloud Security programmes together

JOIN the JCYBER RISK DEFENDERS CLUB today

Join Phoenix Security Community

Exchange Material, get up to speed with the latest application security trends

Data Sheet and Reference materials

Tech-sheet

Datasheet

E-book

Getting started video tour

From our Blog

The team at Phoenix Security pleased to bring you another set of new application security (ASPM) features and improvements for vulnerability management across application and cloud security engines. This release builds on top of previous releases with key additions and progress across multiple areas of the platform. Application Security Posture Management – New Weighted Asset Risk Formula – Auto-approval of Risk Exceptions Asset and Vulnerability Management – Relative Time Filter for Vulnerabilities and Assets – Introduce “Ticket References” for Findings – Search Findings by Ticket ID – Asset Pages now have Settings “memory” Integrations – Snyk IaC+ Vulnerabilities – Extended REST API Other Improvements – Vulnerability Timeline as Stacked Lines – Display App/Env for Assigned Assets
Alfonso Eusebio
Discover the current state of the National Vulnerability Database (NVD) and its significant backlog of 16,476 vulnerabilities. Learn how CISA’s Vulnrichment program and Phoenix Security’s ASPM adn UVM advanced solutions are addressing the challenges in VM, application security, and threat intelligence to enhance cybersecurity resilience.
Francesco Cipollone
Phoenix Security, a leader in cybersecurity innovation, is a finalist in the Infosec Most Innovative Cyber SME Competition 2024. Recognized for its cutting-edge threat intelligence and application security solutions, Phoenix will showcase at Infosec 2024, June 4-6, in London. Backed by significant investments and a stellar advisory board, Phoenix continues to drive industry leadership and excellence. Learn more about their journey and groundbreaking solutions.
Francesco Cipollone
Explore how Phoenix Security is championing cybersecurity by fully embracing the CISA Secure by Design Pledge. Learn about their proactive controls, from enforcing MFA to enhancing breach disclosures, and how they align with the latest CISA KEV guidelines. Join us as we delve into the strategies that make Phoenix a leader in securing digital landscapes.
Francesco Cipollone
The team at Phoenix Security pleased to bring you another set of new application security (ASPM) features and improvements for vulnerability management across application and cloud security engines. This release builds on top of previous releases with key additions and progress across multiple areas of the platform. Application Security Posture Management – New Weighted Asset Risk Formula – Auto-approval of Risk Exceptions Asset and Vulnerability Management – Relative Time Filter for Vulnerabilities and Assets – Introduce “Ticket References” for Findings – Search Findings by Ticket ID – Asset Pages now have Settings “memory” Integrations – Snyk IaC+ Vulnerabilities – Extended REST API Other Improvements – Vulnerability Timeline as Stacked Lines – Display App/Env for Assigned Assets
Alfonso Eusebio

Talks

Quick Start

23 Videos

Community Podcast on Application Security & Cloud Security

Join us as we dive into the future of Application Security (AppSec) and Vulnerability Management with James Berthoty. Discover insights on the evolution of AppSec, challenges in managing software vulnerabilities, and the role of Application Security Posture Management (ASPM) in today’s API-driven cloud environment. Listen now for expert analysis and practical solutions in cybersecurity.
Explore the evolving landscape of application security and ASPM with Marius Poskus, VP at Glow Financial Services. Discover insights on the adoption of open-source code and AI, cultural shifts for DevSecOps, and challenges in maintaining consistent security programs. Sponsored by Phoenix Security, leaders in vulnerability management. Listen now for strategic approaches to managing application security and prioritizing critical issues to align with business goals. #Cybersecurity #AppSec #ProductSecurity #ASPM
Join cybersecurity expert Adam Shostack on the Cybersecurity and Cloud Podcast as he discusses Application Security Posture Management (ASPM), threat modeling, and proactive strategies for enhancing software security. Learn about the impact of government regulations, CISA’s approaches to vulnerability management, and balancing security with profit. Don’t miss these insights to stay ahead in the cybersecurity landscape.
“Discover the crucial role of threat modeling in application security with insights from Irene Michlin, application security lead at Neo4j. Learn how integrating developer perspectives and leveraging AI can enhance your security practices. Join the conversation on the Cybersecurity and Cloud Podcast and explore actionable strategies for robust application security. #Cybersecurity #ThreatModeling #ApplicationSecurity #AI #DevSecOps”
Delve into Application Security Program Management (ASPM) with Akira Brand on the Cybersecurity and Cloud Podcast. Discover how her unique opera background enriches her approach to security, enhancing application safety in a cloud-driven world. Tune in for expert insights on evolving AppSec to product security, the critical role of threat modeling, and strategies for building a resilient security culture.

Start doing what matters today

Listen to the latest Phoenix Security podcast

Get Started with Phoenix Security

Read the latest Phoenix Security news

Read the latest Blogs

Discover our events

Explore the talks

Discover Whitepapers

Read the latest News

Discover video resources

Get in control

More than 1000 Users and 350 Organizations trust us

Peace of Mind

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO