Executive brief on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing. Watch Now

Featured Resource

Red Teaming: Is Your Security Program Ready for the Ultimate Test?

In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.

To ensure its real-time AI platform could withstand sophisticated threats, a global SaaS company partnered with Bishop Fox for its first full red team assessment.
Customer Story

Red Team Activated: Testing a Global Risk Intelligence Platform

To ensure its real-time AI platform could withstand sophisticated threats, a global SaaS company partnered with Bishop Fox for its first full red team assessment.

Ventrilo tested their AI writing assistance platform with application penetration testing and AI/LLM security assessments.
Customer Story

Enhancing AI Security: How Ventrilo.ai Revolutionizes Writing Assistance

Ventrilo.ai partnered with Bishop Fox for application penetration testing and AI security assessments to ensure its writing assistant protects sensitive user data and withstands real-world threats.

Red Team Readiness Guide - Key questions to ask before a red team engagement. Bishop Fox resource for assessing cybersecurity preparedness.
Guide

Red Team Readiness Guide

The Red Team Readiness Guide is a practical, question-driven planning framework that helps security leaders align stakeholders, clarify objectives, and evaluate organizational readiness ahead of a Red Team engagement. Use it to avoid common pitfalls, define business-relevant goals, and set the stage for maximum impact.

Bishop Fox solution brief on AI security testing for large language models (LLMs), featuring human-led adversarial prompt testing, social engineering techniques, and expert methodologies to assess and secure intelligent systems.
Solution Brief

The Human Element of AI Security Solution Brief

Learn how expert-driven testing goes beyond automation to thoroughly assess AI and LLM applications with techniques grounded in human behavior and social engineering.

Bishop Fox Red Team Readiness Assessment resource image, featuring bold red and gray text over a black background and a preview of a planning questionnaire for red team engagement objectives.
Guide

Red Team Readiness Assessment

The Red Team Readiness Assessment is a guided self-assessment worksheet that helps security teams evaluate their preparedness, align stakeholders, and plan more effective Red Team engagements. Use it to define objectives, set scope, and establish the protocols needed for a successful simulation.

Promotional banner for virtual session titled 'Breaking AI: Inside the Art of LLM Pen Testing' featuring stylized graphics of a laptop and glitch art design elements.
Virtual Session

Breaking AI: Inside the Art of LLM Pen Testing

Learn why traditional penetration testing fails on LLMs. Join Bishop Fox’s Brian D. for a deep dive into adversarial prompt exploitation, social engineering, and real-world AI security techniques. Rethink how you test and secure today’s most powerful models.

Subscribe to our blog and advisories

Be first to learn about latest tools, advisories, and findings.

Bold graphic with black background promoting a Sliver Framework workshop titled 'Sliver: Staging & Automation'; features white and neon yellow text, Sliver logo in a white box, and digital glitch-style accents in magenta, cyan, and yellow on the edges.
Workshops & Training

Sliver Workshop Part 2: Staging & Automation

In our second workshop, we’ll explore Sliver’s new implant staging process and demonstrate basic CLI automation features. We’ll also walk through Sliver’s supported pivot types for lateral movement, including TCP, and wrap up by exploring automation options using the SliverPy project.

bfx25_Red team solution brief ft
Solution Brief

Red Team & Adversarial Emulation Solution Brief

With a range of approaches that simulate breach scenarios at your organization, adversarial emulation is the most effective way to know if your team is prepared to detect, respond, and recover—before a real breach happens.

Virtual session titled 'Architecting Cloud Security Testing in the GenAI Era' featuring modern typography and abstract technical design elements.
Virtual Session

Architecting Cloud Security Testing in the GenAI Era

Join Steven Smiley and Jessica Stinson for a deep dive into how early-stage architectural reviews can transform the effectiveness of your testing. Whether you're navigating IAM setups or preparing to tackle GenAI risks in cloud environments, this session has the clarity and direction you need to test smarter—not just harder.

Sliver Framework Getting Started and 1.6 Features Event image with Bishop Fox branding.
Workshops & Training

Sliver Workshop Part 1: Getting Started & 1.6 Features

Watch an interactive workshop led by Bishop Fox Senior Security Consultant, Tim Ghatas, as we dive into Sliver, the open-source C2 framework making waves in Red Team ops.

Interview: PCI DSS 4.0 Offensive Security Requirements Expert Breakdown virtual session with Bishop Fox branding.
Executive Briefing

Panel: PCI DSS 4.0 Expert Breakdown

This executive brief features an expert discussion focusing on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing.

Attacking & Defending Deepfakes: A Red Teamer’s Perspective featured image with Bishop Fox new branding of easter eggs.
Virtual Session

Attacking & Defending Deepfakes: A Red Teamer’s Perspective

Explore the offensive and defensive use of deepfake technology in cybersecurity with Bishop Fox red teamer Brandon Kovacs. This session dives into real-world attack simulations, red team methodologies, and practical mitigation strategies for organizations facing the rapidly growing threat of deepfakes.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.