Understand your current state of ransomware readiness and prepare for ransomware attacks. Get the Guide ›
The Wolf in Sheep's Clothing: How Innocuous Exposures Become Infamous
In the hands of skilled attackers, many "low risk" exposures serve as launching pads or steppingstones to more complex and destructive attacks. Watch our webcast as we dive into real-world examples…
February 23, 2022
Attack Surface Management Summit
Bishop Fox is proud to be a Diamond sponsor of the SecurityWeek Attack Surface Management Summit. Register to attend our sessions and meet our team.
Meet Bishop Fox at CactusCon 10
Bishop Fox is proud to be a Gold sponsor at this year's CactusCon being held in person and virtually.
A Winning Combination: How Imperva & Bishop Fox Quickly Eliminated a Critical Exposure
Go behind the scenes with Bishop Fox and Imperva as we showcase a recent, real-world example of how offensive and defensive security organizations can combine forces to ensure the best security…
Log4j Vulnerability: A Fireside Chat
Join our panelists as they dive into the attacker’s perspective and how you can identify unusual activity and harden systems against further compromise.
Dark Reading Panel Discussion: Detecting and Remediating Application Security Vulnerabilities
Chris Bush joins a panel of experts to discuss some of the most popular methods that attackers use to find vulnerabilities.
Zach Moreno to Speak at ASU DevilSec
Bishop Fox Senior Managing Consultant Zach Moreno will be speaking about his career path and his experience working at Bishop Fox.
What Bad Could Happen? Managing Application Risk with Threat Modeling
What if security could become an integral framework within the software development process? Join Tom Eston and Chris Bush to learn how Threat Modeling is changing the way organizations manage…
Cracking the Code: Secure Code Review in DevSecOps
On-demand webcast offers an in-depth look at how DevOps can integrate both automated and manual code review into the software development lifecycle.