In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.
Red Team Activated: Testing a Global Risk Intelligence Platform
To ensure its real-time AI platform could withstand sophisticated threats, a global SaaS company partnered with Bishop Fox for its first full red team assessment.
Enhancing AI Security: How Ventrilo.ai Revolutionizes Writing Assistance
Ventrilo.ai partnered with Bishop Fox for application penetration testing and AI security assessments to ensure its writing assistant protects sensitive user data and withstands real-world threats.
Red Team Readiness Guide
The Red Team Readiness Guide is a practical, question-driven planning framework that helps security leaders align stakeholders, clarify objectives, and evaluate organizational readiness ahead of a Red Team engagement. Use it to avoid common pitfalls, define business-relevant goals, and set the stage for maximum impact.
The Human Element of AI Security Solution Brief
Learn how expert-driven testing goes beyond automation to thoroughly assess AI and LLM applications with techniques grounded in human behavior and social engineering.
Red Team Readiness Assessment
The Red Team Readiness Assessment is a guided self-assessment worksheet that helps security teams evaluate their preparedness, align stakeholders, and plan more effective Red Team engagements. Use it to define objectives, set scope, and establish the protocols needed for a successful simulation.
Breaking AI: Inside the Art of LLM Pen Testing
Learn why traditional penetration testing fails on LLMs. Join Bishop Fox’s Brian D. for a deep dive into adversarial prompt exploitation, social engineering, and real-world AI security techniques. Rethink how you test and secure today’s most powerful models.
Subscribe to our blog and advisories
Be first to learn about latest tools, advisories, and findings.
Thank You! You have been subscribed.
Sliver Workshop Part 2: Staging & Automation
In our second workshop, we’ll explore Sliver’s new implant staging process and demonstrate basic CLI automation features. We’ll also walk through Sliver’s supported pivot types for lateral movement, including TCP, and wrap up by exploring automation options using the SliverPy project.
Red Team & Adversarial Emulation Solution Brief
With a range of approaches that simulate breach scenarios at your organization, adversarial emulation is the most effective way to know if your team is prepared to detect, respond, and recover—before a real breach happens.
Architecting Cloud Security Testing in the GenAI Era
Join Steven Smiley and Jessica Stinson for a deep dive into how early-stage architectural reviews can transform the effectiveness of your testing. Whether you're navigating IAM setups or preparing to tackle GenAI risks in cloud environments, this session has the clarity and direction you need to test smarter—not just harder.
Sliver Workshop Part 1: Getting Started & 1.6 Features
Watch an interactive workshop led by Bishop Fox Senior Security Consultant, Tim Ghatas, as we dive into Sliver, the open-source C2 framework making waves in Red Team ops.
Panel: PCI DSS 4.0 Expert Breakdown
This executive brief features an expert discussion focusing on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing.
Attacking & Defending Deepfakes: A Red Teamer’s Perspective
Explore the offensive and defensive use of deepfake technology in cybersecurity with Bishop Fox red teamer Brandon Kovacs. This session dives into real-world attack simulations, red team methodologies, and practical mitigation strategies for organizations facing the rapidly growing threat of deepfakes.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.