Feb 05, 2025
From Dial Tone to Throne: IVR Testing in the Spirit of The King of NYNEX
By Alethe Denis
Jan 10, 2025
Navigating Workplace Security: Red Team Insights for the Return to Office
By Alethe Denis
Nov 07, 2024
Application Pen Testing: Point-In-Time vs Ongoing Approaches Explained
By Bishop Fox
Sep 17, 2024
Navigating DORA Compliance: A Comprehensive Approach to Threat-Led Penetration Testing
By Bishop Fox Researchers
Aug 28, 2024
Offensive Security Under the EU Digital Operational Resilience Act (DORA)
By Harley Geiger
Aug 13, 2024
Manipulating the Mind: The Strategy and Practice of Social Engineering
By Alethe Denis
Aug 01, 2024
Adversarial Controls Testing: A Step to Cybersecurity Resilience
By Bishop Fox Researchers
Jul 17, 2024
Leveraging Offensive Security for Effective Post-Attack Recovery
By Bishop Fox Researchers
Jun 14, 2024
How Does Social Engineering Work? From Planning to Execution
By Bishop Fox Researchers
May 29, 2024
Strengthen Security to Mitigate Third-Party Risks
By Matt Twells
Apr 02, 2024
Technology and Software: 2023 Insights From the Ponemon Institute
By Beth Robinson
Apr 01, 2024
Practical Measures for AI and LLM Security: Securing the Future for Enterprises
By Bishop Fox Researchers
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.