AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Security Perspectives

Security Perspective

Navigating Workplace Security: Red Team Insights for the Return to Office

Navigating Workplace Security: Red Team Insights for the Return to Office

Jan 10, 2025

Review how Red Team insights can shed light on gaps in physical security and play a pivotal role in enhancing workplace security during the continued transition back to office environments as we relearn verification, protocol, and authorization.

By Alethe Denis

Security Perspective

Application Pen Testing: Point-In-Time vs Ongoing Approaches Explained

Application Pen Testing: Point-In-Time vs Ongoing Approaches Explained

Nov 7, 2024

Take an in-depth look at multiple approaches to application penetration testing, and the organizational requirements that would favor one approach over another. This blog will explore the different approaches and share key considerations for choosing the best approach for your organization.

By Bishop Fox

Security Perspective

Navigating DORA Compliance: A Comprehensive Approach to Threat-Led Penetration Testing

Navigating DORA Compliance: A Comprehensive Approach to Threat-Led Penetration Testing

Sep 17, 2024

Explore how organizations can strategically prepare for and execute TLPT to meet DORA compliance while strengthening overall cybersecurity resilience.

By Bishop Fox Researchers

Security Perspective

Offensive Security Under the EU Digital Operational Resilience Act (DORA)

Offensive Security Under the EU Digital Operational Resilience Act (DORA)

Aug 28, 2024

Explore the EU's new DORA regulation and how financial entities and their ICT vendors must promptly align their security frameworks with DORA's requirements to mitigate potential risks and ensure operational stability.

By Harley Geiger

Security Perspective

Manipulating the Mind: The Strategy and Practice of Social Engineering

Manipulating the Mind: The Strategy and Practice of Social Engineering

Aug 13, 2024

Explore the intricacies of social engineering, explore its various forms, and describe how adversaries set, define, and achieve objectives leveraging social engineering tactics and strategies.

By Alethe Denis

Security Perspective

Adversarial Controls Testing: A Step to Cybersecurity Resilience

Adversarial Controls Testing: A Step to Cybersecurity Resilience

Aug 1, 2024

Take an in-depth look at Adversarial Controls Testing assessments (ACT), an offensive security testing approach that evaluates the effectiveness of an organization's email, endpoint, and network security controls by simulating real-world attacks.

By Bishop Fox Researchers

Security Perspective

Leveraging Offensive Security for Effective Post-Attack Recovery

Leveraging Offensive Security for Effective Post-Attack Recovery

Jul 17, 2024

Bishop Fox's CISO Christie Terrill and former VP of Consulting Tom Eston discuss leveraging offensive security strategies for effective post-attack recovery, providing practical steps for remediation and building long-term cyber resilience.

By Bishop Fox Researchers

Security Perspective

How Does Social Engineering Work? From Planning to Execution

How Does Social Engineering Work? From Planning to Execution

Jun 14, 2024

Discover the key points from our webcast, "How Does Social Engineering Work? in this recap blog.

By Bishop Fox Researchers

Security Perspective

Strengthen Security to Mitigate Third-Party Risks

Strengthen Security to Mitigate Third-Party Risks

May 29, 2024

Explore highlights from a recent webcast where special guest Anirban Banerjee, CEO and co-founder of partner Riscosity, and Matt Twells, senior solutions architect, explore critical considerations for developing a security program that prioritizes third-party risk reduction.

By Matt Twells

Security Perspective

Technology and Software: 2023 Insights From the Ponemon Institute

Technology and Software: 2023 Insights From the Ponemon Institute

Apr 2, 2024

Gain cutting edge insights into offensive security strategies used by the Technology & Software industry.

By Beth Robinson

Security Perspective

Practical Measures for AI and LLM Security: Securing the Future for Enterprises

Practical Measures for AI and LLM Security: Securing the Future for Enterprises

Apr 1, 2024

Gain insights into how enterprises can take a pragmatic and informed approach to AI and LLM technology adoption, ensuring reduced security risks.

By Bishop Fox Researchers

Security Perspective

Implementing the FDA's 2023 Requirements for Medical Device Cybersecurity

Implementing the FDA's 2023 Requirements for Medical Device Cybersecurity

Mar 12, 2024

Gain actionable tips to operationalize the FDA's 2023 legislation, H.R. 2617 Section 524B product security requirements for medical devices.

By Matt Twells

Security Perspective

Enabling Proper PCI Testing with External Penetration Tests

Enabling Proper PCI Testing with External Penetration Tests

Feb 14, 2024

Gain actionable insights on how to maximize external penetration testing to develop comprehensive PCI security strategies.

By Derek Rush

Security Perspective

Navigating Threats: Adopting Proactive Social Engineering and Network Testing Strategies

Navigating Threats: Adopting Proactive Social Engineering and Network Testing Strategies

Jan 16, 2024

Get insights from Bishop Fox experts on social engineering tactics, implementing technical controls, and the importance of internal network testing.

By Beth Robinson

Security Perspective

Strengthening Cybersecurity Defenses: Validating Incident Response Plans with Red Team Tabletop Exercises

Strengthening Cybersecurity Defenses: Validating Incident Response Plans with Red Team Tabletop Exercises

Jan 4, 2024

In this blog, learn how Bishop Fox Red Team tabletop exercises help organizations test Incident Response plans against tactics, techniques, and procedures used by attackers.

By Alethe Denis

Security Perspective

Purple Teaming: Validating Cybersecurity Investments and Enhancing Efficiency

Purple Teaming: Validating Cybersecurity Investments and Enhancing Efficiency

Dec 6, 2023

Learn how Purple Teaming brings together offensive and defensive strategies for a more comprehensive and impactful cybersecurity approach.

By Ryan Basden

Security Perspective

Healthcare: 2023 Insights from the Ponemon Institute

Healthcare: 2023 Insights from the Ponemon Institute

Nov 28, 2023

Get insights into offensive security trends in the healthcare sector with data from the Ponemon Institute’s 2023 State of Offensive Security Report.

By Beth Robinson

Security Perspective

Red Teaming: 2023 Insights from the Ponemon Institute

Red Teaming: 2023 Insights from the Ponemon Institute

Oct 4, 2023

Learn why mature organizations turn to Red Teaming to improve cybersecurity resiliency.

By Beth Robinson

Security Perspective

Financial Services: 2023 Insights From the Ponemon Institute

Financial Services: 2023 Insights From the Ponemon Institute

Sep 19, 2023

Get a sneak peek into why FinServ organizations are at the forefront of offensive security.

By Beth Robinson

Security Perspective

The Dark Side of Convenience: Understanding the Dangers of Digital Supply Chain

The Dark Side of Convenience: Understanding the Dangers of Digital Supply Chain

Sep 5, 2023

Dive into this blog for an offensive security perspective on the dangers of the digital supply chain.

By Beth Robinson

Security Perspective

A Bishop Fox Recap - Hacker Summer Camp 2023

A Bishop Fox Recap - Hacker Summer Camp 2023

Aug 23, 2023

Get a Bishop Fox recap of the 2023 Hacker Summer Camp in Las Vegas.

By Beth Robinson

Security Perspective

Cloud Offensive Security: 2023 Insights From the Ponemon Institute

Cloud Offensive Security: 2023 Insights From the Ponemon Institute

Jul 18, 2023

In this blog, we explore how offensive security solutions are implemented by mature organizations to proactively protect cloud environments.

By Beth Robinson

Security Perspective

Architecting An Offensive Security Blueprint: 2023 Insights From the Ponemon Institute

Architecting An Offensive Security Blueprint: 2023 Insights From the Ponemon Institute

Jun 14, 2023

Learn how mature organizations are designing offensive security blueprints to defend forward against today's most advanced adversaries and threats.

By Tom Eston

Security Perspective

Bank Vault or Screen Door? How Attackers View Financial Services

Bank Vault or Screen Door? How Attackers View Financial Services

Mar 20, 2023

Bank vault or screen door? Learn how FinServ attack surfaces appear to a hacker, how they prefer to exploit, and where they look for vulnerabilities.

By Beth Robinson

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.