New from Ponemon Institute: The State of Offensive Security in 2023. Read the Report ›

Featured Resource

Get the Blueprint: Insights from Ponemon Institute’s 2023 State of Offensive Security Study

Hear from experts Larry Ponemon & Tom Eston, as they reveal our findings from a joint report with the Ponemon Institute on the 'State of Offensive Security' in 2023.

Headshot of main speaker: Matt Twells, Senior Solutions Architect and title of webcast: Pacemakers to Pacesetters.

Pacemakers to Pacesetters: A Practical Guide to Operationalizing the FDA's 2023 Cybersecurity Requirements

Join our webcast with Matt Twells to understand the impact of the FDA's HR.2617 legislation on medical device cybersecurity, learn how to build a robust plan, address vulnerabilities, manage supply chain risks, and anticipate future trends.

Image from YouTube of Cloud Security Podcast epiode 188

Cloud Security Podcast: Network Pentest 2.0 - The Cloud Pentest Revolution

Cloud configuration review is not a cloud security pen test! For this episode we have ⁠Seth Art ⁠from Bishop Fox to clarify the myth.

2023 Q4 WEBCAST Purple Teaming Tile

Purple Teaming for Security Success: Enhancing ROI and Facilitating Growth

In this webcast, uncover how purple teaming initiatives can transform cybersecurity from a perceived cost center to a revenue-protecting asset. Ryan Basden, Red Team security consultant, will guide you through establishing security baselines, validating investments, and formulating a roadmap for organizational growth.

Video clip from Pentest Tools Episode featuring Bishop Fox's Alethe Denis.

Pentest Tools Podcast: We Think We Know How to Explain the Value of a Penetration Test

Hear from Bishop Fox's Alethe Denis in the first episode of Pentest Tool's 'We Think We Know' podcast to unravel the intricacies of security testing.

Training session title: Swagger Jacker Training about improved auditing of OpenAPI Definition Files with the headshot os security consultant Tony West, a Bishop Fox adversarial operator.

Swagger Jacker: Improved Auditing of OpenAPI Definition Files

Discover the power of Swagger Jacker, an open-source audit tool designed to improve inspection of unintentionally exposed OpenAPI definition files for penetration testers.

Video thumbnail featuring the speaker headshot, Jon Guild, and the title of the webcast: How to Ace the OSEP exam with the Sliver Framework.

Ace the OSEP Exam with Sliver Framework

Unlock the secrets of passing the OSEP exam with our senior security expert, Jon Guild. Join us as Jon shares his invaluable tips and tricks for conquering this benchmark exam designed for penetration testers.

Subscribe to Bishop Fox's Security Blog

Be first to learn about latest tools, advisories, and findings.

Video thumbnail featuring the three panelists headshots and the title of the fireside chat on dark brackground.

Pragmatic AI & LLM Security Mitigations for Enterprises

Immerse yourself in the vibrant world of AI and Language Learning Models (LLMs) in our webinar presented in collaboration with industry leaders from Moveworks.

Purple gradient background with headshot of speaker on left side.

OWASP ASVS: Unlocking Stronger Application Security

Join offensive security expert Shanni Prutchi in this livestream as she shares her analysis of the 278 verification requirements listed in OWASP's Application Security Verification Standard (ASVS). Learn how to generate test cases and gain insights to effectively test your applications against the standard.

Bridging the Gap Integrating Tabletop Exercises and Red Teaming for Seamless Incident Response with purple background and Bishop Fox logo.

Bridging the Gap: Integrating Tabletop Exercises and Red Teaming for Seamless Incident Response

Hear from Shanni Prutchi, Security Consultant III, to learn about enhancing your organization's incident response capabilities through combined red teaming and tabletop exercises. Explore attack detection, response, and the importance of established processes.

Preview of the cover page of the Cosmos report on Data Analysis unveiling critical vulnerabilities in attack surfaces.

Cosmos: Protecting the Perimeter

To understand the vulnerability landscape that organizations are up against, we meticulously examined 17,000 data points, extracted from over 110 billion automations, within a 12-month period. Download the report to view a comprehensive propensity model that allows security and organizational leadership to visualize the potential impact of leaving vulnerable exposures to chance.

Webcast title with speakers' headshot: Combatting Adversaries: Proactive Social Engineering & Network Testing.

Combatting Adversaries: Proactive Social Engineering & Network Testing

Join us for a fireside chat that illuminates the importance of proactive social engineering defense and the key role of internal network testing in orchestrating a successful counteroffensive against cyberattacks.

Ponemon report on offensive security for Financial Services title with preview of the guide.

The Offensive Security Blueprint for Financial Services

Bishop Fox's Financial Services industry cut provides a comprehensive analysis of offensive security trends within financial services, using industry data gathered from our joint research report with the Ponemon Institute.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.