blog

New Features Released – Jan-Feb 22

Beginning of the year, wars, a slowdown economy but that has not stopped us from getting you those amazing features

We have a new Mascotte (Diego the appsec cat)

Also, the team is working hard despite being in a tough spot (Ukraine war)

Get me to the new amazing features!

New Integrations:

  • Integrate with SNYK Container
  • Improve usage of Snyk data
  • Capture and display Snyk’s long description
  • Associate Snyk vulnerabilities with correct scan type
  • Integrate with GitHub CodeQL scanner
  • Import vulnerabilities in BurpSuite XML format
  • Complete SonarCloud integration
  • New Dome 9 extensions

New Workflow

  • Integrate with Azure DevOps
  • Integrate with GitHub Issues
  • Improved Comments, Security Context and other elements in Jira tickets
  • Working on Slack, ServiceNow

New Features:

  • OWASP Signup flow & New Free Licence
  • Zero-day vulnerability alerts and matching
  • Create screen Cloud Assets
  • Create screen for Containers (Dockerfile, image)
  • Enable Google OAuth flow (not used in Prod)
  • Complete False Positive flow
  • Complete Deployed Applications page
  • Complete changes to Apps and Envs pages
  • Updated permissions mechanism
  • Update license mechanism
  • Improvements to the Vulnerabilities list page
  • Display license details in Org Settings
  • Improve ASP Admin search
  • Improve Org Settings screen
  • Show Vuln Risk Elements as text in Summary
  • Update Selection Engine rules for vuln selection
  • Update Risk Formula

0 Day Alerts with auto-identification of the vulnerable apps

Asset inventory table & SLA/MTTO/MTTR
Since you are here why not subscribe to our amazing mailing list?it takes just one click 🙂 
Get me all the latest news
Did you know we have a book available on how to run application security programmes? 
get your free copy below 
Get the Application Security Compendium here
 
Application Security Zero to Hero

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Contextual vulnerability management is a comprehensive approach to identifying, analyzing, and mitigating vulnerabilities in software and cloud infrastructure. It involves considering the specific context and environment in which vulnerabilities exist, including the software and hardware components, the network infrastructure, and the organizational policies and processes in place. By adopting this approach, organizations can more effectively assess and mitigate the risks posed by vulnerabilities, helping to protect their assets and maintain the security of their systems and networks.
Francesco Cipollone
Cyber security risk is challenging to calculate. Real-Time context, Cyber threat intelligence, Ownership Vulnerabilities, all part of the same continuum ->
Alfonso Eusebio
In today’s digital world, cyber threats are a real and growing concern for organizations of all sizes. As the threat landscape continues to evolve. we explore in this blog how to threat treats, which one to use in your prioritization strategy
Sally Turner

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

x Logo: ShieldPRO
This Site Is Protected By
ShieldPRO