The New role of Threat-Centric Approach in Application Security Posture Management (ASPM) an Agentic ASPM in real life

ASPM, rthreat centric, threat actor, agentic ai, aspm, application security, vulnerability managment.

Vulnerability management has long been a critical aspect of cybersecurity; however, as vulnerabilities continue to evolve, ASPM becomes more critical, and threat actors become more sophisticated, cybersecurity teams must adapt their strategies to stay ahead of increasingly sophisticated threats. 

Agentic AI for threat-centric analysis is a cool term, but how does it apply to real-life scenarios? I’ve taken a few real case studies for vulnerabilities that have high threat profiles, like memory corruption or remote code execution. 

The Growing Threat of Exploited Vulnerabilities

Over the past several years, enterprises and SME have faced a significant increase in vulnerability exploitation, particularly those that allow for remote code execution (RCE) or memory corruption. 

Reference Verizon DBR 25 

According to the Verizon Data Breach Report (DBR), exploitation remains one of the primary drivers of data breaches, with threat actors continuously evolving their methods to exploit weaknesses in software.

The Mandian M Trend report further confirms that exploitation is often the main contributor to security incidents, driving the need for a more proactive approach to vulnerability management.

We all know about the recent vulnerability database (NVD) collapse, with analysis of vulnerabilities lagging behind 

Phoenix Security analysis over time of the NVD Backlog

This is where the threat-centric approach truly shines. Rather than merely reacting to vulnerabilities, organizations must understand the motivations and techniques of the threat actors who target them. For instance, vulnerabilities that allow for unauthenticated remote code execution, like those seen in the Citrix ADC or MOVEit Transfer breaches, should be treated with the highest level of urgency. These types of flaws are not just theoretical—they have been repeatedly exploited in real-world attacks, including by high-profile ransomware groups like LockBit and Clop. Moreover, as the graph below confirms, the phishing attack techniques decrease while the exploitation of vulnerabilities has kept a steady> 30%

Agentic AI in ASPM: A Threat-Centric Approach to Ransomware 

Agentic AI is undubitaly changing vulnerability management, with many vendors using the word as an alternative for chatbot, a real application like the threat-centric lens to vulnerability analysis. This advanced AI model can sift through massive amounts of data, identify exploitation trends, and predict which vulnerabilities are most likely to be targeted by threat actors. Combined with exposure and reachability analysis, this creates a more effective vulnerability management framework (see below, Phoenix Security ASPM).

An alternative method when data source are lagging behind or a secondary dimension of analysis that we have studied in the threat-centric approach, and illustrated with the model below: are there clear indicators of exploitation of vulnerabilities and is there a high percentage of those threats that get exploited in specific attacks (ransomware, zero day) 

We can break down the analysis into two segments:

  • Threats and attacks with active exploitation (where CTI and other sources of intelligence give real exploitation like in the case of moveit transfer  
  • A probabilistic approach to determine if a method of exploitation is more likely to lead to vulnerability exploitation or not. 

For ransomware, for example, the analysis using the agentic ai threat researcher tells us that a vulnerability with a remote code execution has a higher probability of being exploited than one with Directory traversal. Now this should give us an indication that is reinforced by other factors like exploitation in the wild, the EPSS dataset, exposure of the system where those vulnerabilities are exploited in the wild to the internet, and more. Those values should not be taken alone, but are definitely of significance if you want to discern whether a vulnerability class is more dangerous than another 

Another aspect is which threat actor use more a methodology of attack vs other? There is no clear cut in here so we won’t use this for analysis. Rather, derive the CWE and the threat type to derive a more granular determination of which CWE  leads to CAPEC, to TTP, and threat actor, as this method is more precise

Agentic AI ASPM: A Threat Centric Approach to Zero DAY

A Data-Driven, Proactive Approach to Zero-Day Exploits

Zero-day vulnerabilities are another key focus of the threat-centric approach in ASPM. These flaws remain hidden until attackers discover and exploit them, often causing significant damage before patches are released. However, with the right threat intelligence, organizations can predict and prepare for zero-day exploits more effectively.

Agentic AI plays a critical role here as well, especially when analyzing vulnerabilities that are prime targets for zero-day exploitation, such as remote code execution and memory corruption. For example, in the MOVEit Transfer breach, the Clop ransomware group exploited a SQL injection vulnerability (CVE-2023-34362) to gain unauthorized access to sensitive data. The rapid exploitation of this vulnerability—before a patch was available—illustrates the importance of maintaining an active and threat-aware security posture.

By applying a threat-centric approach, organizations can better predict which vulnerabilities are likely to be exploited in the wild, allowing for faster patching, mitigation, and response efforts. This proactive stance is critical for preventing large-scale attacks that often lead to data theft and ransomware extortion.

Below an analysis of zero-day data using the agentic ai threat researcher, which tells us that remote code execution over the years and in general has a crushing majority, together with memory corruption

Zero Day Attack Methods and Techniques 

Phoenix Security ASPM Threat Centric Analysis

The information in this article is also available in greater detail in the White Paper – A threat-centric approach
on vulnerabilities.

Threat Centric Vulnerability Root cause analysisasd

Download the White Paper on LLM Application for a Threat-Centric Approach on Vulnerabilities

The need for a more proactive approach to vulnerability management is clear. The case studies of Citrix ADC and MOVEit Transfer underscore the importance of understanding threat actor behavior and exploitation patterns. These breaches highlight the dangerous combination of high-impact vulnerabilities and motivated, resourceful threat actors. As demonstrated by both cases, vulnerabilities that allow for remote code execution or privilege escalation in internet-facing applications are ripe targets for exploitation.

To effectively protect against these types of threats, organizations must embrace a holistic security strategy that incorporates both vulnerability management and threat-centric analysis. Exposure to the web, reachability analysis, and contextual risk assessments are all essential components of this approach. By integrating these factors into a comprehensive security framework, organizations can ensure they are not just responding to vulnerabilities but actively preventing exploitation.

The Role of ASPM in Strengthening Security Posture

Application Security Posture Management (ASPM) plays a pivotal role in this proactive vulnerability management framework. ASPM tools help organizations continuously monitor and assess the security of their applications, ensuring that vulnerabilities are identified and remediated before they can be exploited. When combined with a threat-centric approach, ASPM offers a powerful means of defending against attacks.

By adopting a threat-centric methodology, organizations can more effectively prioritize vulnerabilities based on their exposure and the likelihood of exploitation. This approach helps reduce the attack surface and ensure that critical vulnerabilities are addressed in a timely manner. Furthermore, ASPM tools can help track and manage vulnerabilities across the application lifecycle, providing the necessary insights to strengthen defenses against evolving threats.

Case Study: Citrix ADC VPN Gateway Code Injection & Buffer Overflow (CVE-2023-3519 & CVE-2023-4966) Agentic ASPM Approach

See live agentic ASPM approach for Citrix ADC

CVE-2023-3519 VectorVENDOR] NetScaler[PRODUCT] ADC and NetScaler Gateway[VERSION] 13.1 before 13.1-49.13, 13.0 before 13.0-91.13, 13.1-FIPS before 13.1-37.159, 12.1-FIPS before 12.1-55.297, 12.1-NDcPP before 12.1-55.297[WEAKNESS] Reflected Cross-Site Scripting, Privilege Escalation, Unauthenticated remote code execution[ATTACKER] remote attacker[IMPACT] execute arbitrary code, gain root administrator privileges, cross-site scripting[ROOTCAUSE] improper input handling, improper privilege management, code injection[VULNERABILITY TYPE] Cross-Site Scripting, Privilege Escalation, Remote Code Execution[VULNERABILITY IMPACT] execute arbitrary code, gain root administrator privileges, cross-site scripting
CVE-2023-4966:  vector[VENDOR] NetScaler[PRODUCT] ADC and NetScaler Gateway[COMPONENT] Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server[WEAKNESS] sensitive information disclosure[IMPACT] information disclosure[VULNERABILITY TYPE] information disclosure[VULNERABILITY IMPACT] sensitive information disclosure

Description: Citrix’s ADC (Application Delivery Controller) is an enterprise VPN and load balancing appliance widely used for remote access. In mid-2023, two critical vulnerabilities hit these devices:

  • CVE-2023-3519: A Code Injection vulnerability allowing unauthenticated RCE on the Citrix gateway.
  • CVE-2023-4966: A Buffer Overflow (heap overflow) in Citrix Gateway dubbed “Citrix Bleed,” allowing session hijack and potential code execution.

These were essentially door-opening flaws in a perimeter device.

  • Vulnerability Characteristics: Both had the Impact of unauthenticated Remote Code Execution. The root causes were Improper Input Handling leading to Code Injection and Memory Corruption (buffer overflow). Both affected an internet-facing, popular appliance used in thousands of organizations (including critical infrastructure).
  • Hot to use a scoring method to validate the sentiment of dangerousness: Score would be maxed: RCE (+5), injection or overflow (+3), widely used VPN (+2), network-facing/no auth (+3). That’s 13+. Additionally, Citrix ADC had a notorious history – a similar flaw in 2019 (CVE-2019-19781) was massively exploited by ransomware groups (e.g., RagnarLocker) in 2020. So prior precedent exists (cross-reference factor). Everything about these screamed urgency.
  • Exploitation: CVE-2023-3519 was exploited as a zero-day – an attack hit a critical infrastructure org in June 2023 before the patch was released. After patch release in July, within a day PoCs emerged and widespread scanning started. It quickly made the KEV list. CVE-2023-4966 (“Citrix Bleed”) was also exploited in the wild as a zero-day in August 2023. What’s more, by October 2023, it was reported that the LockBit 3.0 ransomware group had leveraged CVE-2023-4966 to breach a major company (Comcast). Attackers chaining these flaws could bypass multi-factor auth and execute code on VPN appliances, then move into the network. These Citrix vulns became one of the top exploited issues of 2023, with governments warning about them. They illustrate the worst-case: an unpatched gateway leading directly to ransomware infiltration.
  • Outcome: Organizations that were monitoring for unusual activity might have detected exploitation (e.g., webshells on Citrix devices) if they hadn’t patched immediately. But some were caught off-guard, especially by the zero-day usage. The quick turnaround from patch to widespread exploit release meant that any delay in patching (even a week or two) left a window that LockBit and others exploited. On the positive side, Citrix admins who subscribed to Citrix’s advisories or CISA alerts knew this was critical and many patched within 24-48 hours, likely preventing innumerable incidents.

Lesson: Perimeter devices are high-value targets – treat their vulnerabilities as critical by default. This case also shows the importance of threat intel: hearing that a vulnerability was exploited as a 0-day (even if your org wasn’t hit yet) should trigger immediate action. In our Phoenix security framework, this would elevate the risk and mark it with a high likelihood of exploitation in the wild. Other factors like the exposure, business criticality, and reachability of the system come into play. 

Also, it underlines repeating patterns: the Citrix gateway had been targeted before; this was a repeat scenario, so those aware of history might have predicted that any new Citrix RCE would see similar attacks.

Not all of those elements can be evaluated automatically, hence why a threat-centric approach with human supervision is key. 

Case Study: MOVEit Transfer SQL Injection (CVE-2023-34362)

Exploited Vulnerability, Vulnerability Management, Phoenix ASPM, Zero-day, CVE-2023-34362

See Live mapping for CVE-2023-34362 in the AI agentic analysis

Description: Progress MOVEit Transfer is a managed file transfer solution used by many organizations. In May 2023, CVE-2023-34362, a SQL Injection vulnerability, was discovered in MOVEit. Attackers could send a crafted payload to the MOVEit web interface to execute SQL commands, ultimately leading to arbitrary code execution on the server (via exploitation of the database and writing a webshell).

  • Vulnerability Characteristics: Impact = Remote Code Execution (via SQLi); Root cause = *SQL Injection (Improper Neutral Description (continued): The MOVEit flaw was essentially a classic injection in a web application, leading to arbitrary file upload and code execution. It was present as a 0-day (unknown prior to attacks).
  • Predictive Indicators: Our framework would label this as Impact = RCE (+5), Root cause = SQL Injection (+3), Widely used file transfer software (+2), remote/unauthenticated (+3). Score ~13. Even though MOVEit isn’t as ubiquitous as Windows, many companies use it to share sensitive files, making it a juicy target. The moment details emerged that this was SQLi-enabling remote code, the risk level was clear.
  • Exploitation: In late May 2023, the Clop ransomware group (a data-theft extortion crew) exploited CVE-2023-34362 en masse. They discovered the vulnerability and used automated scripts to compromise hundreds of MOVEit servers around the world before a patch was available – a true zero-day attack. They implanted webshells via the SQLi, stole vast amounts of data from the servers, and later extorted victims under threat of releasing the data. This campaign was one of the largest single-vulnerability exploitation events of 2023. It landed CVE-2023-34362 in CISA’s KEV and the top-exploited lists. The fact that Clop pulled this off underscores how ransomware actors can pivot to pure zero-day exploitation when the opportunity arises (they had done something similar with Accellion FTA in 2020). After disclosure, security researchers released PoC scripts, but by then, the damage was done mainly by Clop.
  • Outcome: Organizations had to scramble to patch once Progress released fixes, and many had to perform incident response to see if they were compromised. Those few who might have caught suspicious behavior (like unexpected file downloads or new files on the MOVEit server) could have mitigated or prevented data theft. However, because it was a zero-day, only those highly proactive, like isolating critical file transfer systems from the internet, or applying temporary SQL filters via WAF, had any shot at prevention pre-patch.

Lesson: A web app SQL injection in a high-value system is effectively an open door. Despite being a “web app vulnerability” (sometimes not given the same attention as system vulnerabilities), this one had a direct business impact. It highlights the need for organizations to also monitor threat intel (the FBI and CISA issued alerts quickly) and to have emergency processes for zero-day mitigation. For prediction, it reinforced that input validation bugs in externally-facing applications are prime targets and should be treated with zero-day-level urgency once revealed.


These case studies – PaperCut, Zerologon, Citrix ADC, and MOVEit – each reinforce the same core point: vulnerability characteristics telegraphed the eventual threat. In every case, a combination of high impact (RCE/PrivEsc) and dangerous root cause (injection/auth bypass/memory corruption) was present, and in every case attackers moved swiftly to exploit. In some cases, exploits preceded public disclosure (zero-days), but even there, our framework would have identified the risk if one were evaluating the vulnerability internally (e.g., a code audit finding like Zerologon’s should be fixed ASAP, given its nature).

Conclusion: The Future of Application Security

As threats continue to grow in sophistication and frequency, the traditional methods of vulnerability management are no longer enough. A shift to a more proactive, threat-centric approach is necessary to stay ahead of malicious actors. By leveraging tools like Agentic AI, exposure analysis, and ASPM, organizations can gain a clearer understanding of which vulnerabilities pose the greatest risk and take action before exploitation occurs.

The key takeaway is that vulnerability management must go beyond simply patching known flaws—it must focus on understanding the threat landscape, the motivations of adversaries, and the potential impact of each vulnerability. By doing so, organizations can minimize risk, improve security posture, and prevent the devastating effects of cyberattacks.

For a robust, forward-thinking security strategy, embracing a threat-centric approach in combination with ASPM, vulnerability management, and real-time threat intelligence is not just recommended—it’s essential.

How Phoenix Security Can Help

attack graph phoenix security
ASPM

Organizations often face an overwhelming volume of security alerts, including false positives and duplicate vulnerabilities, which can distract from real threats. Traditional tools may overwhelm engineers with lengthy, misaligned lists that fail to reflect business objectives or the risk tolerance of product owners.

Phoenix Security offers a transformative solution through its Actionable Application Security Posture Management (ASPM), powered by AI-based Contextual Quantitative analysis and an innovative Threat Centric approach. This innovative approach correlates runtime data with code analysis and leverages the threats that are more likely to lead to zero day attacks and ransomware to deliver a single, prioritized list of vulnerabilities. This list is tailored to the specific needs of engineering teams and aligns with executive goals, reducing noise and focusing efforts on the most critical issues. Why do people talk about Phoenix

Automated Triage: Phoenix streamlines the triage process using a customizable 4D risk formula, ensuring critical vulnerabilities are addressed promptly by the right teams.

Contextual Deduplication: Utilizing canary token-based traceability, Phoenix accurately deduplicates and tracks vulnerabilities within application code and deployment environments, allowing teams to concentrate on genuine threats.

Actionable Threat Intelligence: Phoenix provides real-time insights into vulnerability’ exploitability, combining runtime threat intelligence with application security data for precise risk mitigation.

ASPm, CISA KEV, Remote Code Execution, Inforamtion Leak, Category, Impact, MITRE&ATTACK, AI Assessment, Phoenix CISA KEV, Threat intelligence

By leveraging Phoenix Security, you not only unravel the potential threats but also take a significant stride in vulnerability management, ensuring your application security remains up to date and focuses on the key vulnerabilities.

Get in control of your Application Security posture and Vulnerability management

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

The journey of securing an organization’s application landscape varies dramatically, depending on where a company stands in its maturity. Early-stage startups with small security teams face challenges not only with vulnerabilities but also with scaling their security processes in line with their growth. On the flip side, established enterprises struggle with managing complex environments, prioritizing remediation, and dealing with vast amounts of vulnerabilities while staying ahead of sophisticated threats. For startups, the focus is clear—establish visibility and ensure core security practices are in place. Application Security Posture Management (ASPM) tools provide a straightforward, automated approach to detecting vulnerabilities and enforcing policies. These solutions help reduce risk quickly without overburdening small security teams. Mature organizations, on the other hand, are tackling a different set of problems. With the sheer number of vulnerabilities and an increasingly complicated threat landscape, enterprises need to fine-tune their approach. The goal shifts toward intelligent remediation, leveraging real-time threat intelligence and advanced risk prioritization. ASPM tools at this stage do more than just detect vulnerabilities—they provide context, enable proactive decision-making, and streamline the entire remediation process. The emergence of AI-assisted code generation has further complicated security in both environments. These tools, while speeding up development, are often responsible for introducing new vulnerabilities into applications at a faster pace than traditional methods. The challenge is clear: AI-generated code can hide flaws that are difficult to catch in the rush of innovation. Both startups and enterprises need to adjust their security posture to account for these new risks. ASPM platforms, like Phoenix Security, provide automated scanning of code before it hits production, ensuring that flaws don’t make it past the first line of defense. Meanwhile, organizations are also grappling with the backlog crisis in the National Vulnerability Database (NVD). A staggering number of CVEs remain unprocessed, leaving many businesses with limited data on which to base their patching decisions. While these delays leave companies vulnerable, Phoenix Security steps in by cross-referencing CVE data with known exploits and live threat intelligence, helping organizations stay ahead despite the lag in official vulnerability reporting. Whether just starting their security program or managing a complex infrastructure, organizations need a toolset that adapts with them. Phoenix Security enables businesses of any size to prioritize vulnerabilities based on actual risk, not just theoretical impact, helping security teams navigate the evolving threat landscape with speed and accuracy.
Francesco Cipollone
The cybersecurity world is reeling as MITRE’s funding for the CVE and NVD systems expires, disrupting the backbone of global vulnerability management. As traditional sources like the National Vulnerability Database collapse under funding cuts and submission backlogs, security teams face delays, incomplete data, and loss of automation in remediation pipelines. This isn’t just a data problem—it’s a structural crisis for application security and vulnerability correlation. In this landscape of uncertainty, Phoenix Security’s ASPM platform steps up with a code-to-cloud correlation engine that doesn’t depend on outdated data workflows. By connecting code-level insights (including tools like Semgrep) to runtime and cloud environments, Phoenix enables faster, context-aware vulnerability remediation—even as NVD and CVE pipelines deteriorate. This article dives into the implications of the CVE shutdown and how Phoenix Security is helping security and development teams transition to a resilient, correlation-first approach to cybersecurity.
Francesco Cipollone
Learn how to predict ransomware risks and vulnerability exploitation using a threat-centric approach. Explore data-driven insights, verified exploit trends, and methods for assessing the likelihood of attacks with key references to CISA KEV, EPSS, and Phoenix Security’s 4D Risk Formula.
Francesco Cipollone
Remote Code Execution flaws continue to undermine Kubernetes ingress integrity. IngressNightmare (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) showcases severe threat vectors in NGINX-based proxies, leading to cluster-wide exposure. ASPM, robust remediation tactics, and strong application security solutions—like Phoenix Security—mitigate these vulnerabilities before ransomware groups exploit them.
Francesco Cipollone
Remote Code Execution flaws continue to undermine Kubernetes ingress integrity. IngressNightmare (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) showcases severe threat vectors in NGINX-based proxies, leading to cluster-wide exposure. ASPM, robust remediation tactics, and strong application security solutions—like Phoenix Security—mitigate these vulnerabilities before ransomware groups exploit them.
Francesco Cipollone
The recent Google acquisition of Wiz for $32 billion has sent shockwaves through the cybersecurity industry, particularly in the realm of Application Security Posture Management (ASPM). This monumental deal highlights the critical importance of cloud security and the growing demand for robust ASPM solutions. While the acquisition promises potential benefits for Google Cloud users, it also raises concerns about vendor lock-in and the future of cloud-agnostic security. Explore the implications of this acquisition and discover how neutral ASPM solutions like Phoenix Security can bridge the gap in multi-cloud environments, ensuring continuous, collaborative, and comprehensive security from code to cloud.” – Find Assets/Vulns by Scanner – Detailed findings Location information Risk-based Posture Management – Risk and Risk Magnitude for Assets – Filter assets and vulnerabilities by source scanner Integrations – BurpSuite XML Import – Assessment Import API Other Improvements – Improved multi-selection in filters – New CVSS Score column in Vulnerabilities
Alfonso Eusebio
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO