AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Security Perspectives

Security Perspective

Red Teaming: The Ultimate Sanity Check for Security Teams

Red Teaming: The Ultimate Sanity Check for Security Teams

Feb 16, 2023

Learn how to take control of security program investments with Red Teaming.

By Trevin Edgeworth, Mark MacDonald

Security Perspective

8 Network Pen Testing Tools for Your Hacker Arsenal

8 Network Pen Testing Tools for Your Hacker Arsenal

Jan 17, 2023

Check out our recommendations for top network pen testing tools to level up your hacking skills.

By Britt Kemp

Security Perspective

Our Favorite Tools of the Year: 2022 Edition

Our Favorite Tools of the Year: 2022 Edition

Dec 27, 2022

Check out out favorite pen testing tools that we loved using in 2022!

By Britt Kemp

Security Perspective

The Latest in Ransomware: A Path of Cyber Destruction

The Latest in Ransomware: A Path of Cyber Destruction

Dec 12, 2022

In this blog, we share a roundup of recent ransomware events, how ransomware continues to forge a path of destruction, and shed light on efforts to slow the pace of attacks.

By Beth Robinson

Security Perspective

A CISO's Approach to Ransomware Playbooks

A CISO's Approach to Ransomware Playbooks

Nov 29, 2022

Get a CISO's perspective on testing your security defenses against real-world ransomware playbooks.

By Beth Robinson

Security Perspective

Don't Get Caught in the Dark: How to Build Better Documentation for Security Teams

Don't Get Caught in the Dark: How to Build Better Documentation for Security Teams

Oct 31, 2022

In this blog, we share our recommendations for improving technical documentation guidelines and strategies for security teams.

By Andy Doering

Security Perspective

Behind the Scenes, New Insights from SANS Hacker Survey

Behind the Scenes, New Insights from SANS Hacker Survey

Oct 27, 2022

Get inside the mind of a hacker with highlights from our webcast, Hacker Insights Revealed; New SANS Survey Results

By Beth Robinson

Security Perspective

Sharing the Power of Cybersecurity Awareness

Sharing the Power of Cybersecurity Awareness

Oct 5, 2022

In honor of Cybersecurity Awareness Month, we've gathered our top tips to help your family, friends, and community members stay safer in the virtual world.

By Beth Robinson

Security Perspective

Know Your Enemy, Know Yourself: Examining the Mind of a Cyber Attacker

Know Your Enemy, Know Yourself: Examining the Mind of a Cyber Attacker

Sep 28, 2022

We partnered with SANS to bring you a groundbreaking report that explores the minds and methodologies of modern cyber adversaries. See what inspired our research and get access to the full report.

By Wes Hutcherson

Security Perspective

Pathways to Security: A Look at University, Military and STEM Programs

Pathways to Security: A Look at University, Military and STEM Programs

Aug 29, 2022

Level up your knowledge of university, military and STEM pathways into the cybersecurity industry to start planning your career journey.

By Beth Robinson

Security Perspective

Organized: The Kingpins of Cybercrime

Organized: The Kingpins of Cybercrime

Jul 14, 2022

In this blog, learn about the transformations that cybercrime groups have undergone and why potential victims should pay attention.

By Beth Robinson

Security Perspective

Veterans of the Fox Den

Veterans of the Fox Den

Jul 4, 2022

Today (and everyday) is the perfect occasion to celebrate our Veterans of the Fox Den. Learn how our veterans served their nation and found cybersecurity as a civilian career path.

By Beth Robinson

Security Perspective

A 2022 RSA Conference Recap: IRL Edition

A 2022 RSA Conference Recap: IRL Edition

Jun 21, 2022

Didn't make it to RSA 2022? Or haven't had a chance to use your virtual pass? No problem! Check out our blog recap highlighting our favorite sessions and what we loved about them.

By Britt Kemp

Security Perspective

Stepping into the Spotlight at Security Conferences

Stepping into the Spotlight at Security Conferences

Jun 13, 2022

In this blog, we share tips and tricks for how to get involved at security conferences, including which events are our favorite, how to submit CFPs, and tips for enhancing speaking presentations.

By Britt Kemp

Security Perspective

Getting Schooled in Security: Bishop Fox Academy

Getting Schooled in Security: Bishop Fox Academy

May 10, 2022

We recently launched Bishop Fox Academy, a company-wide career development and continuous learning program to uphold our position as an offensive security leader.

By Andrew Wilson

Security Perspective

The Foxes of Mexico: A Security Roundtable

The Foxes of Mexico: A Security Roundtable

May 1, 2022

In honor of Dia del Trabajo (Labor Day) on May 1, we talked to Foxes in Mexico about their cybersecurity journeys, life at Bishop Fox, Mexico as a tech leader, and any advice they have to fellow Mexicans who want to join the industry.

By Beth Robinson

Security Perspective

Ransomware: How Adversaries are Upping the Ante

Ransomware: How Adversaries are Upping the Ante

Apr 27, 2022

During the last few years, no other cyber threat has dominated headlines as much as ransomware, with SANS even declaring 2020 and 2021 “the years of ransomware”. Explore the latest ransomware trends, including ransomware as decoys, RaaS, and attacks on supply chains.

By Trevin Edgeworth

Security Perspective

Cloud 9: Top Cloud Penetration Testing Tools

Cloud 9: Top Cloud Penetration Testing Tools

Feb 24, 2022

You spoke, and we listened! Earlier this year, we asked what pen testing tool list we should publish next. A list that focused on the cloud was the clear crowd favorite. So that being said, here are nine of our favorite tools for cloud pen tests.

By Britt Kemp

Security Perspective

Perceptual Analysis: A Look at Bishop Fox’s New Technology Patent

Perceptual Analysis: A Look at Bishop Fox’s New Technology Patent

Jan 26, 2022

We’ve achieved a significant milestone in transforming the offensive security space with the recent patent grant award of our innovative technique known as perceptual analysis (US Patent No. 11,218,496). Get the technical details of our patent and learn more about perceptual analysis.

By Joe Sechman

Security Perspective

Taking Home Gold: The Best InfoSec Talks & Research of the Year

Taking Home Gold: The Best InfoSec Talks & Research of the Year

Jan 4, 2022

Lots of research, security talks, and vulnerabilities caught our attention this past year. In this recap, we’ll provide an overview of some of the research we found interesting, some of the talks we found the most compelling, and some of the vulnerabilities we won’t (or can’t) forget anytime soon.

By Britt Kemp

Security Perspective

The Pen Testing Tools We’re Thankful for in 2021

The Pen Testing Tools We’re Thankful for in 2021

Nov 23, 2021

Searching for a pen testing tool to put to use during a security engagement? Check out our annual list of penetration testing tools our consultants have found helpful during this past year.

By Britt Kemp

Security Perspective

Continuous Security: Threat Modeling in DevSecOps

Continuous Security: Threat Modeling in DevSecOps

Nov 8, 2021

Threat modeling can fit in to a DevSecOps program quite well, as it’s inherently a collaborative exercise between security and development.

By Chris Bush

Security Perspective

9 OSINT Tools For Your Reconnaissance Needs

9 OSINT Tools For Your Reconnaissance Needs

Oct 29, 2021

There’s no shortage of OSINT tools, techniques, and other resources – in fact, there’s so much stuff, it’s a little overwhelming to try and sort through it all. Writing a “best of” or otherwise “cumulative” list would be a futile endeavor, so instead, we compiled 9 OSINT tools we find useful.

By Britt Kemp

Security Perspective

The Code Reveals All: Why Secure Code Review Should be an Integral Part of DevSecOps

The Code Reveals All: Why Secure Code Review Should be an Integral Part of DevSecOps

Oct 12, 2021

Chris Bush provides a review of why secure code review should be an integral part of every DevSecOps lifecycle and the strategies teams should adopt.

By Chris Bush

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.