AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Security Perspectives

Security Perspective

CA Single Sign-On Software Update: Stay Secure

CA Single Sign-On Software Update: Stay Secure

Mar 23, 2016

Bishop Fox's Mike Brooks discovered two vulnerabilities in the CA Single Sign-On application. If you use CA Single Sign-On, update your software immediately.

By Bishop Fox

Security Perspective

On Apple, Encryption, and Privacy

On Apple, Encryption, and Privacy

Mar 2, 2016

Resident iPhone and iOS experts Joe DeMesy and Carl Livitt discuss Apple's stance on privacy + encryption in this Bishop Fox blog post.

By Joe DeMesy and Carl Livitt

Security Perspective

Building a Winning Security Team From the Top Down

Building a Winning Security Team From the Top Down

Oct 20, 2015

Growing your security team? Dropbox Head of Trust & Security Patrick Heim shares his insights with Bishop Fox Partner Vincent Liu in this blog post.

By Vincent Liu

Security Perspective

ISO 27018: The Long-Awaited Cloud Privacy Standard

ISO 27018: The Long-Awaited Cloud Privacy Standard

May 20, 2015

How does ISO 27018 affect cloud services users and providers? Bishop Fox's Birgit Mullen explains its ramifications in this blog post.

By Birgit Thorup Mullen

Security Perspective

Security Should Be Application-Specific

Security Should Be Application-Specific

Apr 27, 2015

Security is dependent on the nature of the application in question, and must be taken into consideration when constructing security objectives.

By Bishop Fox

Security Perspective

AirDroid: How Much Do Your Apps Know?

AirDroid: How Much Do Your Apps Know?

Apr 15, 2015

The vulnerability discovery in the AirDroid web application leads to a far greater question: Are you aware of the permissions you grant your apps?

By Matt Bryant

Security Perspective

Beyond Security Requirements: Secure Requirements

Beyond Security Requirements: Secure Requirements

Mar 17, 2015

How do secure requirements differ from security requirements? And how do you create strong ones? Bishop Fox's Brenda Larcom explains in this blog post.

By Bishop Fox

Security Perspective

Stand Your Cloud: A Series on Securing AWS

Stand Your Cloud: A Series on Securing AWS

Feb 13, 2015

Bishop Fox's Ruihai Fang covers several AWS security best practices in this three-part series. In Part 1, he addresses data loss and security risk.

By Ruihai Fang

Security Perspective

In Heartbleed’s Wake: A Password Primer

In Heartbleed’s Wake: A Password Primer

Sep 16, 2014

Heartbleed left many people on edge about their passwords. Christie Terrill discusses proper password security in this Bishop Fox blog post.

By Christie Terrill

Security Perspective

Examining The Impact Of Heartbleed

Examining The Impact Of Heartbleed

Apr 10, 2014

Heartbleed is one of the most significant Internet security vulnerabilities. Security Analyst Tim Sapio explains what led to the breach & how to stay safe.

By Tim Sapio

Security Perspective

LinkedIn 'Intro'duces Insecurity

LinkedIn 'Intro'duces Insecurity

Oct 23, 2013

LinkedIn Intro was released in 2013 - and came with a lot of security issues. We investigated the mobile app's security shortcomings in this blog post.

By Carl Livitt

Security Perspective

Guide to Hardening Your Firefox Browser in OS X

Guide to Hardening Your Firefox Browser in OS X

May 22, 2013

Our Firefox Hardening Guide for OS X has some tips to help you stay more secure as you browse the web. Updates coming soon!

By Carl Livitt

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.