AI Meets Application Security: Phoenix Security Steals the Show at OWASP London

Phoenix Security in OWASP London.

Phoenix Security turned heads at the OWASP London Chapter event on June 26 with a bold stance on AI, vulnerability management, and the power of a human-first approach to application security. The event, hosted at Thought Machine HQ in London, was a full house — and not just for the fast LEGO cars and legendary swag.

Francesco Cipollone speaking at OWASP London

The Human-Centric AI Second Initiative

AI is being integrated everywhere in security tooling, often without regard to how engineers actually work. Phoenix Security offered a different take: AI should serve humans, not the other way around.

Francesco Cipollone’s keynote dove into the AI Second mindset, warning against blindly offloading sensitive data into LLMs without structure or policy. The real innovation lies in building systems that enhance human decisions — not replace them.

This wasn’t a theory. Phoenix Security showcased live integrations of AI-powered threat-centric agents developed in collaboration with Google, built to correlate CVEs with exploitability and risk in real time.

A screenshot of a computer

AI-generated content may be incorrect.

AI Threat Centric Approach on vulnerabilities

ASPM with Threat-Centric Intelligence

Application Security Posture Management (ASPM) took center stage as Phoenix Security demonstrated how it bridges traditional vulnerability management gaps.

Instead of flooding DevSecOps teams with thousands of low-priority alerts, ASPM filters and prioritizes vulnerabilities based on real-world exploitability and cloud context. Combined with Phoenix’s threat-centric AI, this enables teams to shift from remediation-by-spreadsheet to strategic, risk-based decisions.

Key capabilities highlighted:

  • Real-time CVE correlation across code, pipelines, and cloud workloads.
  • Integration with cloud misconfiguration scanners for complete code-to-cloud visibility.
  • Automated remediation workflows prioritized by business impact.

Phoenix Security demoing ASPM dashboard for DevSecOps teams

DevSecOps With Speed and Precision

Where most vendors promise automation, Phoenix Security delivers intelligence. Our DevSecOps strategy aligns security automation with engineering reality — no more endless Jira tickets with “fix someday” status.

By embedding ASPM across SDLC stages — from code commit to cloud deployment — teams gain:

  • Centralized visibility on vulnerabilities tied to actual assets.
  • Contextual remediation playbooks, not generic patches.
  • Feedback loops to development without alert fatigue.

Attendees saw how this model accelerates secure releases while reducing mean time to remediation (MTTR).

From Autographs to Asphalt: Racing Through AppSec Fun

OWASP London wasn’t just technical — it was memorable. I signed copies of “Application Security: The Phoenix Way”, and attendees competed in LEGO race car challenges for exclusive swag.

The community was front and center. Hosted by OWASP’s Sam Stepanyan — a mainstay in the London security scene — the atmosphere reflected what OWASP is all about: open knowledge, real conversations, and cutting through the AI hype with honesty.

Where ASPM Meets Reality

OWASP London confirmed that ASPM isn’t just another acronym — it’s a reality, reshaping how security fits into the software delivery chain. With vulnerability management often seen as reactive or noisy, Phoenix Security offers clarity, prioritization, and action.

Attendees left with more than LEGO cars. They walked away with:

  • A blueprint for risk-based remediation.
  • Insights into using AI where it actually helps.
  • A model for making AppSec measurable, human, and fast.

Next up? Phoenix heads stateside for OWASP DC. But London, as always, was the proving ground — and it delivered.

Want to future-proof your DevSecOps? Start with visibility, automation that matters, and ASPM that works.


Ready to Slash the Noise?

If you’re tired of chasing vulnerabilities that don’t matter—or worse, don’t even exist in runtime—Phoenix Security’s Container Lineage, Contextual Deduplication, and Throttling features are built to cut your backlog down to what’s real.

Not noise. Not theory. Actionable security.

📍 Want to dive deeper?

How Phoenix Security Can Help with Container Vulnerability Sprawl

attack graph phoenix security
ASPM

Application Security and Vulnerability Management teams are tired of alert fatigue. Engineers are buried in vulnerability lists that say everything is critical. And leadership? They want to know what actually matters.

Phoenix Security changes the game.


With our AI Second Application Security Posture Management (ASPM), powered by container lineage, contextual deduplication, and container throttling, we help organizations reduce container false positives up to 98% and remove up to 78% of false positives in container open source libraries, pointing the team to the right remediation

Why Container Lineage Matters:

Most platforms tell you there’s a problem. Phoenix Security tells you:

  • Where it lives (code, build, container, cloud)
  • Who owns it
  • If it’s running
  • If it’s exploitable
  • How to fix it

All of this is delivered in one dynamic, prioritized list, mapped to the real attack paths and business impact of your applications.


Here’s What You Get:

  • Contextual Intelligence from Code to Runtime: Understand which vulnerable components are actually deployed and reachable in production, not just listed in a manifest.
  • Noise Reduction with Automated Throttling: Disable inactive container alerts and slash duplicate findings by over 90%, letting your team focus on the vulnerabilities that matter.
  • 4D Risk Scoring That Maps to Real-World Threats: Built-in exploit intelligence, Probability of exploitation, EPSS, exposure level, and business impact baked into a customizable formula. No more CVSS-only pipelines.

Vulnerability overload isn’t a badge of diligence—it’s a liability.

Container lineage in Phoenix Security helps you shut down false positives, stop chasing ghosts, and start solving the right problems.

👉 Book a demo today

Or learn how Phoenix Security slashed millions in wasted dev time for fintech, retail, and adtech leaders.

Get in control of your Application Security posture and Vulnerability management

Product Designer & Marketing Manager with over 7 years of experience delivering impactful design solutions across the USA and European markets. Focused on designing intuitive and secure digital user experiences for complex systems.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

The team at Phoenix Security pleased to bring you another set of new application security (ASPM) features and improvements for vulnerability management across application and cloud security engines. This release builds on top of previous releases with key additions and progress across multiple areas of the platform. Application Security Posture Management (ASPM) Enhancements • New Weighted Asset Risk Formula – Refined risk aggregation for tailored vulnerability management. • Auto-Approval of Risk Exceptions – Accelerate mitigation by automating security approvals. • Enhanced Risk Explorer & Business Unit Insights – Monitor and analyze risk exposure by business units for better prioritization. Vulnerability & Asset Management • Link Findings to Existing Tickets – Seamless GitHub, ServiceNow, and Azure DevOps integration. • Multi-Finding Ticketing for ADO – Group multiple vulnerabilities in a single ticket for better workflow management. • Filter by Business Unit, CWE, Ownership, and Deployment Environment – Target vulnerabilities with precision using advanced filtering. Cyber Threat Intelligence & Security Enhancements • Cyber Threat Intelligence Premium – Access 128,000+ exploits for better exploitability and fixability metrics. • SBOM, Container SBOM & Open Source Artifact Analysis – Conduct deep security analysis with reachability insights. • Enhanced Lacework Container Management – Fetch and analyze running container details for better security reporting. • REST API Enhancements – Use asset tags for automated deployments and streamline security processes. Other Key Updates • CVE & CWE Columns Added – Compare vulnerabilities more effectively. • Custom Status Management for Findings – Personalize security workflows with custom status configurations. • Impact & Risk Explorer Side Panel – Gain heatmap-based insights into vulnerability distribution and team risk impact. 🚀 Stay ahead of vulnerabilities, optimize risk assessment, and enhance security efficiency with Phoenix Security’s latest features! 🚀
Rowan Scott
DevSecOps isn’t one-size-fits-all—especially when it comes to metrics. Every team, every stakeholder, every layer of the application stack measures progress and risk differently. Phoenix Security bridges these gaps with a unified platform that connects attribution, remediation, and real-time risk insights across the code-to-cloud continuum, redefining the standard for Application Security beyond traditional ASPM.
Ksenia Mityushkina
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO