AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Security Perspectives

Security Perspective

Contain Your Toxic Waste: Keep Prod Out of Dev

Contain Your Toxic Waste: Keep Prod Out of Dev

Aug 29, 2019

Tony Lozano discusses the importance of avoiding the mistake of putting production data in dev environments. This common practice creates security issues.

By Tony Lozano

Security Perspective

Every Sign Has a Story

Every Sign Has a Story

Aug 12, 2019

Thiago Campos reviews Google G Suite Developer's guide and provides some context on warnings that can go unnoticed by developers more focused on functionality than security.

By Thiago Campos

Security Perspective

How Bishop Fox Enables Wickr's Security Assurance

How Bishop Fox Enables Wickr's Security Assurance

Aug 6, 2019

Wickr enlisted Bishop Fox to perform an examination of their security including quarterly assessments, penetration testing, and source code review.

By Bishop Fox

Security Perspective

My Path to Security - How Christie Terrill Got Into Security

My Path to Security - How Christie Terrill Got Into Security

Mar 25, 2019

VP of Customer Success Christie Terrill shares her cybersecurity career journey and her life at Bishop Fox in this blog post.

By Bishop Fox

Security Perspective

My Path to Security - How Tom Wilhelm Got Into Security

My Path to Security - How Tom Wilhelm Got Into Security

Jan 21, 2019

See how Bishop Fox Practice Director Tom Wilhelm has enjoyed a long and rewarding career in cybersecurity in this blog post.

By Bishop Fox

Security Perspective

My Path to Security - How Gerben Kleijn Got Into Security

My Path to Security - How Gerben Kleijn Got Into Security

Oct 11, 2018

Learn how Gerben Kleijn - a Bishop Fox Managing Consultant - got his start in an infosec career, which ultimately took him to his current job at Bishop Fox.

By Bishop Fox

Security Perspective

Password Security: The Good, the Bad, and the "Never Should Have Happened"

Password Security: The Good, the Bad, and the

Aug 16, 2018

This Bishop Fox guide to password security will help inform your organization's password policy procedures.

By Candis Orr

Security Perspective

A Primer to Red Teaming

A Primer to Red Teaming

Jul 31, 2018

Is red teaming right for your organization? What do you need to be successful? What's the difference between a blue team and a red team - or even a red team and a purple team? Find out in this guide

By MJ Keith

Security Perspective

My Path to Security - How Matt Frost Got Into Cybersecurity

My Path to Security - How Matt Frost Got Into Cybersecurity

Jul 20, 2018

Read about how Senior Security Consultant Matt Frost got his start in infosec - and his start at Bishop Fox.

By Bishop Fox

Security Perspective

How 'Small' Security Errors Lead to a Security Breach

How 'Small' Security Errors Lead to a Security Breach

Jul 16, 2018

In the wake of the Timehop breach, the social media aggregator chose a transparent approach in disclosure. Bishop Fox partnered with them in this guide and case study on how small cybersecurity errors

By Alex DeFreese

Security Perspective

WPA3 Is a Major Missed Opportunity: Here's Why

WPA3 Is a Major Missed Opportunity: Here's Why

Jun 30, 2018

The announced WPA3 is a well-intentioned attempt at strengthening open Wi-Fi security, but it's not enough. Dan Petro describes the problem and possible solutions.

By Dan Petro

Security Perspective

My Path to Security - How Kelly Albrink Got Into Security

My Path to Security - How Kelly Albrink Got Into Security

Jun 15, 2018

Former art dealer Kelly Albrink is a self-taught infosec professional hailing from a one-of-a-kind background. Learn how she got into infosec in this blog post.

By Kelly Albrink

Security Perspective

Hello World! Introducing the Bishop Fox Cybersecurity Style Guide

Hello World! Introducing the Bishop Fox Cybersecurity Style Guide

Feb 15, 2018

The Bishop Fox cybersecurity style guide is a one-of-a-kind resource that bridges the gap between the infosec industry and the general public. This invaluable resource is available for download at our

By Brianne Hughes, Catherine Lu

Security Perspective

My Time at NetWars Tournament of Champions

My Time at NetWars Tournament of Champions

Jan 24, 2018

Security Analyst Kelly Albrink got the chance to compete at SANS Rocky Mountain NetWars.

By Kelly Albrink

Security Perspective

Your Worst Case Scenario: An Introduction to Threat Modeling

Your Worst Case Scenario: An Introduction to Threat Modeling

Dec 11, 2017

A threat modeling how-to authored by Bishop Fox's Joe Ward. Learn how your organization can start implementing this important (but simple) process.

By Joe Ward

Security Perspective

Bug Bounties & Beyond: An Interview With HackerOne's Mårten Mickos

Bug Bounties & Beyond: An Interview With HackerOne's Mårten Mickos

Aug 23, 2017

In this Marten Mickos interview, Vincent Liu chats with HackerOne's CEO on his beliefs in transparency and the changing face of the security industry.

By Vincent Liu

Security Perspective

What the Newly Drafted NIST Password Guidelines Mean to You

What the Newly Drafted NIST Password Guidelines Mean to You

May 30, 2017

Nathan Elendt breaks down implications of the newly drafted NIST password guidelines in this post. Learn how your organization can best harness them.

By Nathan Elendt

Security Perspective

A Guide to Choosing the Right VPN

A Guide to Choosing the Right VPN

Apr 6, 2017

Read Bishop Fox's VPN guide before making a VPN choice for the privacy of your browsing experience.

By Kevin Sugihara

Security Perspective

Star Wars: I Find Your Lack of Segmentation Disturbing

Star Wars: I Find Your Lack of Segmentation Disturbing

Dec 4, 2016

Was a lack of network segmentation what foiled the Empire? According to Fran Brown, it was. Right in time for "Star Wars: Rogue One," here is his take.

By Francis Brown

Security Perspective

Telling the Security Story: An Interview with Josh Koplik

Telling the Security Story: An Interview with Josh Koplik

Nov 10, 2016

Josh Koplik is the CISO for IAC as well as the subject of Vincent Liu's latest cybersecurity expert interview. Read their conversation here.

By Vincent Liu

Security Perspective

What Security Leaders Can Learn About Decision-Making

What Security Leaders Can Learn About Decision-Making

Aug 24, 2016

In our latest cybersecurity leaders feature, Richard Seiersen from GE Healthcare shares his decision making philosophy with Bishop Fox's Vincent Liu.

By Vincent Liu

Security Perspective

How to Engineer Secure Things: Past Mistakes and Future Advice

How to Engineer Secure Things: Past Mistakes and Future Advice

Jun 15, 2016

Internet of Things security often is an afterthought. Nathan Elendt chronicles the do's and do nots of how engineers can create secure connected devices.

By Nathan Elendt

Security Perspective

The Power of 'Agile' Security at Dun & Bradstreet

The Power of 'Agile' Security at Dun & Bradstreet

Jun 1, 2016

Dun & Bradstreet CSO dishes on agile security and how it transformed his security program - and eventually, the entire business.

By Vincent Liu

Security Perspective

On Apple, Encryption, and Privacy: A Word About Decryption

On Apple, Encryption, and Privacy: A Word About Decryption

Mar 31, 2016

The FBI's decision to pursue decryption on an Apple iPhone without their buy-in has far-reaching consequences for consumer privacy.

By Carl Livitt

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.