What is shift smart? Shift Smart: Risk-based approach to application security vulnerabilities  

How to Implement a risk based approach on application security

What is shift smart

Shift left has dominated the scene for application security and vulnerability management, we will analyse this in this article, Shifting Smart: use a Risk-based and contextual approach to vulnerability management. Bringing security tooling from production to the left (development) has generated enormous benefits and improved security practices but also created many vulnerabilities in the backlog.

How to implement a risk-based approach to application security?

In this talk, Francesco Cipollone explores how to avoid solving all the vulnerabilities and focus only on the one that matters most.

Summary of Application security talk

Francesco Cipollone, CEO and founder of Phoenix Security, discusses the challenges of vulnerability management and prioritization in application security. He emphasizes the importance of context and risk management in determining what vulnerabilities to fix and what not to fix. Cipollone suggests involving the business in the decision-making process and contextualizing vulnerabilities in terms of risk. He also stresses the importance of maintaining a positive and light approach to security. The video also discusses the importance of creating a coherent story around why a vulnerability hasn’t been exploited, especially when speaking to executives. The speaker emphasizes the need for context and a rational reason for why a vulnerability may not be a problem in the near future. The complexities of application security are also discussed, specifically focusing on the process of designing, building, testing, and operating. The speaker highlights the need to empower the business to make the right decisions with the right tools at the right time. The triage and staging of vulnerability management are also discussed, with the speaker emphasizing the need for a balance between automated and human decision-making. The importance of contextualizing vulnerability management and prioritizing risks in a way that is understandable to business stakeholders is also discussed. The use of AI and machine learning is suggested as a way to scale vulnerability management, but the speaker cautions that it is important to ensure the data being used is accurate and relevant. The video concludes with a discussion of the potential for AI to improve vulnerability management and the importance of providing context to stakeholders.

Shift Smart: How to implement a Secure SSDLC?

Want to know what a mature SDLC looks like in the modern age? Shift Smart: It’s all about building, testing, and operating with many moving components. With so many decisions to make, sometimes fixing vulnerabilities in a rapid mode is the way to go, but there always needs to be a balance. That’s why fast triage is crucial in the development process. Learn more about prioritizing vulnerability backlogs with a management solution in place.

The vulnerability management can be divided between fast triage and a backlog of security vulnerability fixes.

Shift Smart: How to set risk base targets in application security?

Want to reach the nirvana of business success? Shift smart and Unify your business, dev and ops, and security angles! This will drive business risks, enable better collaboration, and lower application security risks. And don’t be afraid to evolve your SLA – a risk-based approach is the way forward for balanced team management. Check out our articles and books for more insights!

More on risk-based SLA: https://phoenix.security/whitepapers-resources/data-driven-application-security-vulnerability-management-are-sla-slo-dead/

Shift Smart: How to automate triage in application security

Reachability, Exploitability, and Contextualization are all terms used to prioritize vulnerabilities, but what are they?

Automating vulnerability triage? It’s not as straightforward as you think. Nuances in the triage process make it hard to automate everything. But fear not! I’ve broken it down for you. The left side of the triage process can be automated with a degree of complexity, while the right side requires more human decision-making. So, automate what you can and make business decisions where you can’t. Please find out how to strike the perfect balance in our latest research.

What is reachability

Reachability from a network perspective means this vulnerability can even be triggered remotely.

Reachability from a code perspective is very different. Does this function get called? Can you find a code path to trigger the vulnerability in all the code calls?

What is the context of application security?

With network reachability, we can prioritize externally facing vs internally facing web and with a sound asset inventory,

Complexity is business complexity or the number of assets an application or service has

When it comes to exploitability, we’ve got several factors, from Threat intelligence to fixability and exploitability if an exploit is available to the likelihood of exploitation in the next 30 days leveraging EPSS data and more! #VulnerabilityManagement #AutomationWins 🤖💪

How can Security Phoenix Help 

Phoenix security enables organizations to ingest vulnerabilities from multiple locations, aggregating them into products and visualizing the risk level of those products. 

Phoenix security cutting-edge contextual risk-based algorithms enable organisations to prioritise application security vulnerabilities based on context and probability of exploitation and present a unified impact analysis.

The cutting-edge vulnerability selection engine enables organisations to set risk-based targets that translate into specific actions for engineers. 

Get in control of your Application Security posture and Vulnerability management

Moreover, Phoenix Security’s correlation capabilities can help organizations link the activities in the code with the context in the shift-right part, ensuring that issues are identified and addressed proactively. Using Phoenix Security’s scorecard, organizations can create a common language between the security, development, and business teams, ensuring everyone is aligned and focused on achieving the same goals.

shift smart, risk based, vulnerability management, phoenix security

Finally, Phoenix Security’s ability to create risk-based profiles can help organizations translate their security goals into dynamic and smart targets for engineers. By using risk-based profiles, engineers can prioritize their work and focus on the most critical issues, ensuring that they make the most effective use of their time and resources.

Overall, by leveraging Phoenix Security’s powerful capabilities, organizations can implement a smart, risk-based approach to software development that ensures the success of their initiatives while minimizing risk and improving overall efficiency. With Phoenix Security as their partner, organizations can feel confident that they are taking a proactive approach to software development that is aligned with their business objectives and goals.

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Learn how to predict ransomware risks and vulnerability exploitation using a threat-centric approach. Explore data-driven insights, verified exploit trends, and methods for assessing the likelihood of attacks with key references to CISA KEV, EPSS, and Phoenix Security’s 4D Risk Formula.
Francesco Cipollone
Remote Code Execution flaws continue to undermine Kubernetes ingress integrity. IngressNightmare (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) showcases severe threat vectors in NGINX-based proxies, leading to cluster-wide exposure. ASPM, robust remediation tactics, and strong application security solutions—like Phoenix Security—mitigate these vulnerabilities before ransomware groups exploit them.
Francesco Cipollone
Remote Code Execution flaws continue to undermine Kubernetes ingress integrity. IngressNightmare (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974) showcases severe threat vectors in NGINX-based proxies, leading to cluster-wide exposure. ASPM, robust remediation tactics, and strong application security solutions—like Phoenix Security—mitigate these vulnerabilities before ransomware groups exploit them.
Francesco Cipollone
The recent Google acquisition of Wiz for $32 billion has sent shockwaves through the cybersecurity industry, particularly in the realm of Application Security Posture Management (ASPM). This monumental deal highlights the critical importance of cloud security and the growing demand for robust ASPM solutions. While the acquisition promises potential benefits for Google Cloud users, it also raises concerns about vendor lock-in and the future of cloud-agnostic security. Explore the implications of this acquisition and discover how neutral ASPM solutions like Phoenix Security can bridge the gap in multi-cloud environments, ensuring continuous, collaborative, and comprehensive security from code to cloud.” – Find Assets/Vulns by Scanner – Detailed findings Location information Risk-based Posture Management – Risk and Risk Magnitude for Assets – Filter assets and vulnerabilities by source scanner Integrations – BurpSuite XML Import – Assessment Import API Other Improvements – Improved multi-selection in filters – New CVSS Score column in Vulnerabilities
Alfonso Eusebio
The team at Phoenix Security pleased to bring you another set of new application security (ASPM) features and improvements for vulnerability management across application and cloud security engines. This release builds on top of previous releases with key additions and progress across multiple areas of the platform. Application Security Posture Management (ASPM) Enhancements • New Weighted Asset Risk Formula – Refined risk aggregation for tailored vulnerability management. • Auto-Approval of Risk Exceptions – Accelerate mitigation by automating security approvals. • Enhanced Risk Explorer & Business Unit Insights – Monitor and analyze risk exposure by business units for better prioritization. Vulnerability & Asset Management • Link Findings to Existing Tickets – Seamless GitHub, ServiceNow, and Azure DevOps integration. • Multi-Finding Ticketing for ADO – Group multiple vulnerabilities in a single ticket for better workflow management. • Filter by Business Unit, CWE, Ownership, and Deployment Environment – Target vulnerabilities with precision using advanced filtering. Cyber Threat Intelligence & Security Enhancements • Cyber Threat Intelligence Premium – Access 128,000+ exploits for better exploitability and fixability metrics. • SBOM, Container SBOM & Open Source Artifact Analysis – Conduct deep security analysis with reachability insights. • Enhanced Lacework Container Management – Fetch and analyze running container details for better security reporting. • REST API Enhancements – Use asset tags for automated deployments and streamline security processes. Other Key Updates • CVE & CWE Columns Added – Compare vulnerabilities more effectively. • Custom Status Management for Findings – Personalize security workflows with custom status configurations. • Impact & Risk Explorer Side Panel – Gain heatmap-based insights into vulnerability distribution and team risk impact. 🚀 Stay ahead of vulnerabilities, optimize risk assessment, and enhance security efficiency with Phoenix Security’s latest features! 🚀
Alfonso Eusebio
Discover CVE-2025-30066 tj-actions/changed-files GitHub Action has been compromised, exposing secrets in CI/CD pipelines and posing a major software supply chain security risk. Attackers injected malicious code into all versions (V1–V45), repointing existing tags to a compromised commit that exfiltrated credentials via GitHub Actions logs. Immediate remediation is required—organizations must scan their repositories, rotate secrets, and replace the action to mitigate risk. Learn how Phoenix Security’s ASPM can automate threat detection and enhance GitHub Actions security.
Francesco Cipollone
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO