AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Cybersecurity workshop graphic “Building Tools: What, When, and How” highlighting practical guidance on when and how to build security tools.
Workshops & Training

Building Tools: What, When, and How

Surrounded by security tools but still tempted to “just build it”? This hands-on workshop breaks down when custom tooling is worth it, when it’s not, and how to build fast, focused tools without overengineering.

Watch Workshop
Red Team Vendors Evaluation Matrix resource graphic by Bishop Fox featuring a red teaming vendor evaluation worksheet.
Guides

Red Team Vendor Evaluation Worksheet

The Red Team Vendor Evaluation Matrix Worksheet is designed to help security leaders evaluate red team vendors thoughtfully before engagement using a structured, question-driven approach.

Read Guide
Bishop Fox “Initial Access” graphic dated February 6, 2026, featuring cybersecurity news and threat intelligence updates.
Executive Briefing

Initial Access: February 6, 2026

This episode covers the rollback of federal software security guidance, insider-driven access risks, ongoing state-sponsored espionage, and the security implications of giving AI tools deep control over infrastructure.

Read Briefing
Service Portfolio APT solution brief Digital Tile
Solution Briefs

Application Portfolio Penetration Testing Solution Brief

Download our solution brief. Learn how to secure entire application portfolios with attacker-realistic testing and expert-validated, trusted results.

Read Briefing
Virtual session graphic titled “AI & Security Risks: A Cyber Leadership Panel,” focused on AI security risks and executive cybersecurity strategy.
Virtual Sessions

AI & Security Risks: A Cyber Leadership Panel

Watch a fireside chat with cybersecurity and AI leaders on today’s real AI security risks. Learn where risk is emerging, how leaders set ownership, the true cost of securing AI, and practical steps teams use to protect AI systems and data.

Watch Session
Bishop Fox “Initial Access” graphic dated January 23, 2026, featuring cybersecurity news and threat intelligence updates.
Podcast

Initial Access: January 23, 2026

A weekly temperature check on security news. What’s new, what’s not, and where the real risk sits.

Learn More
Virtual session graphic titled “Application Security: Getting More Out of Your Penetration Tests,” focused on improving application penetration testing value..
Virtual Sessions

Application Security: Getting More Out of Your Pen Tests

Application pen tests cost real time and money. Learn how to get real value from them. Bishop Fox lead researcher Dan Petro explains what good app tests include, how to evaluate AI-powered testing, and the questions that matter before and after an engagement.

Watch Session
image of teal guide cover with black text and white page on dark background
Guides

Fortifying Your Applications: A Guide to Penetration Testing

Download this guide to explore key aspects of application penetration testing, questions to ask along the way, how to evaluate vendors, and our top recommendations to make the most of your pen test based on almost two decades of experience and thousands of engagements.

Read Guide
Sliver Framework tool Workshop Part 3 Building Better Encoders workshop graphic with big head in background.
Workshops & Training

Sliver Workshop Part 3: Building Better Encoders

In our third Sliver workshop, we explore how Sliver handles traffic encoding by default and how attackers can extend its capabilities with custom Wasm-based encoders. We dive into Sliver’s encoder framework works, what’s possible with WebAssembly, and how to design and test your own encoders.

Watch Workshop
Virtual Session Red Team The Essential Tool for Security Leaders with black and white background and white and red text.
Virtual Sessions

Red Teaming: The Essential Tool for Security Leaders

Watch Trevin Edgeworth, Red Team Practice Director at Bishop Fox, in this virtual session where he will break down how Red Teaming gives leaders the clarity, evidence, and narrative they need to make informed, high-stakes decisions in the current AI landscape.

Watch Session
Virtual session banner titled “Peeling Back the Plastic: Finding 0-Days in IoT Devices” — cybersecurity webcast about discovering zero-day vulnerabilities in Internet of Things hardware.
Virtual Sessions

Peeling Back the Plastic: Finding 0-Days in IoT Devices

Join Senior Security Consultant Nick Cerne for “Peeling Back the Plastic: Finding 0-Days in IoT Devices” on Tuesday, Nov. 18. Learn hands-on techniques for uncovering hidden vulnerabilities in consumer IoT devices and advancing your IoT security research skills.

Watch Session
Product Security Reviews Report - aggregates hands-on assessments across various industries to reveal basic flaws with yellow and grey in Bishop Fox new branding.
Reports

Product Security Reviews: The Basics Are Still the Breach

The Product Security Reviews Report is a data-driven analysis that distills two years of hands-on testing across healthcare, IoT, industrial, and financial systems into a single, sobering insight: attackers don’t need sophistication when simplicity still works. This guide helps security leaders understand why fundamental flaws remain the root cause of breaches—and how to turn that reality into a roadmap for measurable improvement.

Read Report
Virtual session titled ‘The Basics Are the Breach: Lessons from Real-World Product Security Reviews’ — cybersecurity webinar graphic with black background and modern yellow and gray accents.
Virtual Sessions

The Basics are the Breach: Lessons from Real-World Product Security Reviews

In this live virtual session, you’ll explore two years of product testing across healthcare, IoT, industrial, and financial systems—and see how “basic” vulnerabilities continue to cause the biggest damage. Learn how small oversights like default credentials, broken cryptography, and insecure configurations can be chained into full-scale breaches, and what you can do to stop them.

Watch Session
Thumbnail of the Bishop Fox AI-LLM security assessment datasheet.
Datasheets

AI & LLM Security Testing Datasheet

Understanding your exposure is essential to building secure and resilient AI systems. Bishop Fox AI/LLM security assessments provide the experience and expertise to help you navigate this emerging threat landscape.

Download Datasheet
Demystifying 5G Security: Understanding the Registration Protocol — virtual workshop by Bishop Fox exploring 5G registration fundamentals, security gaps, and real-world vulnerabilities.
Workshops & Training

Demystifying 5G Security: Understanding the Registration Protocol

In this hands-on workshop, Senior Security Consultant Drew Jones will break down the fundamentals of the 5G registration protocol, explore where security gaps can emerge, and walk through a live simulated lab demonstrating real-world vulnerabilities.

Watch Workshop
Fireside chat title: Fireside Chat - SaaS Security: Inside Recent Attacks Disrupting Global Enterprises and code showing on a white background.
Virtual Sessions

Fireside Chat - SaaS Security: Inside Recent Attacks Disrupting Global Enterprises

Two recent cyberattacks crippled global enterprises by exploiting Salesforce OAuth mechanisms. Join CISO Christie Terrill and former Salesforce security leader Brian Soby for an exclusive breakdown of these breaches and actionable defense strategies in this live fireside chat.

Watch Session
CloudFox workshop on cloud enumeration techniques for penetration testing.
Virtual Sessions

CloudFox: Cloud Enumeration for Penetration Testing

In this session, Mitchell Sperling, Senior Security Consultant at Bishop Fox, will demonstrate how he uses CloudFox during cloud penetration tests to quickly enumerate large cloud environments and identify interesting attack paths.

Watch Session
Thumbnail of the Bishop Fox guide on LLM-Assisted Vulnerability Research.
Guides

LLM-Assisted Vulnerability Research

Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.

Read Guide
Bishop Fox virtual session on scaling security featuring industry experts discussing lessons from Salesforce AppExchange.
Executive Briefing

Scaling Application Security: Lessons from Salesforce AppExchange

Join top security leaders from Bishop Fox, AppOmni, and Guidewire as they reveal how Salesforce AppExchange set the standard for scalable SaaS security—packed with real-world insights to future-proof your security strategy.

Read Briefing
Virtual event titled
Virtual Sessions

AI War Stories: Silent Failures, Real Consequences

AI doesn’t crash when compromised—it complies. Join Jessica Stinson as she shares real-world AI security failures, revealing how trusted tools are silently hijacked. Learn to spot hidden risks and build resilient AI defenses before silence turns into breach.

Watch Session
To ensure its real-time AI platform could withstand sophisticated threats, a global SaaS company partnered with Bishop Fox for its first full red team assessment.
Customer Stories

Red Team Activated: Testing a Global Risk Intelligence Platform

To ensure its real-time AI platform could withstand sophisticated threats, a global SaaS company partnered with Bishop Fox for its first full red team assessment.

Read Story
Ventrilo tested their AI writing assistance platform with application penetration testing and AI/LLM security assessments.
Customer Stories

Enhancing AI Security: How Ventrilo.ai Revolutionizes Writing Assistance

Ventrilo.ai partnered with Bishop Fox for application penetration testing and AI security assessments to ensure its writing assistant protects sensitive user data and withstands real-world threats.

Read Story
Red Team Readiness Guide - Key questions to ask before a red team engagement. Bishop Fox resource for assessing cybersecurity preparedness.
Guides

Red Team Readiness Guide

The Red Team Readiness Guide is a practical, question-driven planning framework that helps security leaders align stakeholders, clarify objectives, and evaluate organizational readiness ahead of a Red Team engagement. Use it to avoid common pitfalls, define business-relevant goals, and set the stage for maximum impact.

Read Guide
Bishop Fox solution brief on AI security testing for large language models (LLMs), featuring human-led adversarial prompt testing, social engineering techniques, and expert methodologies to assess and secure intelligent systems.
Solution Briefs

The Human Element of AI Security Solution Brief

Learn how expert-driven testing goes beyond automation to thoroughly assess AI and LLM applications with techniques grounded in human behavior and social engineering.

Read Briefing

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.