Featured Resource

Bishop Fox Livestream at DEF CON 32

Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.

Cosmos video demo tile
Video

Cosmos Explained: The People and the Platform Empowering Security Teams

See how Cosmos combines attack surface technology and expert testing in a fully managed service to strengthen your security posture while reducing the burden on your teams.

Tech brief 1 Tile Featured Card
Webcast

Technical Brief on PAN-OS Vulnerability & SonicWall SWI Firmware Decryption

Exclusive Bishop Fox client briefing: Insights into PAN-OS vulnerability (CVE-2024-0012) with Q&A and advanced threat detection strategies.

Adversarial Controls Testing Datasheet preview with purple background.
Datasheet

Adversarial Controls Testing Datasheet

Learn how Adversarial Controls Testing uses an attack-based approach mapped to the MITRE ATT&CK framework to determine the effectiveness of your email/phishing, endpoint, and network security controls.

Headshots of Bishop Fox experts Trevin Edgeworth, Rob Ragan, and Matt Twells
Webcast

Achieving DORA Threat-Led Penetration Testing Requirements

Gain in-depth view into DORA’s threat-led penetration testing framework with practical guidance on how to integrate offensive security services.

2024 Q3 DIGITAL DS Cosmos Service Now Tile
Datasheet

Cosmos for ServiceNow Datasheet

Learn how to effortlessly sync validated exposures from the Cosmos portal into your ServiceNow environment to streamline vulnerability management and remediate dangerous exposures before attackers can exploit them.
Bishop Fox Cosmos Service Now Demo
Video

Cosmos Integration with ServiceNow® Demo

Watch this video to see how you can streamline vulnerability management — from identification to remediation — with Cosmos integration for ServiceNow.

Subscribe to Bishop Fox's Security Blog

Be first to learn about latest tools, advisories, and findings.

Mockup of Bishop Fox's Guide to DORA Threat-Led Pen Testing
Guide

FAQ Guide: Acquiring DORA Threat-Led Penetration Testing

Bishop Fox’s comprehensive DORA FAQ guide walks you through everything you need to know about fulfilling these critical requirements. This resource is a must-have for financial institutions looking to stay ahead of DORA’s complex compliance landscape.

video thumnail of DragonJAR Forum organizers and Hector Cruz
Video

Blue Team or Red Team?

Hear from Héctor Cuevas Cruz as he shares his career from early days in DragonJAR forum to how he's become a team leader of hackers for Bishop Fox.

Headshot of Senior Security Consultant Brandon Kovacs
Webcast

Cyber Mirage: How AI is Shaping the Future of Social Engineering

In this webcast, Senior Security Consultant Brandon Kovacs aims to illuminate the sophisticated capabilities that AI brings to the table in creating hyper-realistic deepfakes and voice clones.

Adversarial Controls Testing Methodology cover page preview on dark background.
Methodology

Bishop Fox Adversarial Controls Testing Methodology

Download our methodology document to learn about our adversarial, attack-based approach to testing your key security controls.

Traeger Video Card Template
Video

Where there’s smoke…: How a Traeger vulnerability could have put grilling season at risk

Bishop Fox Security Consultant, Nisk Cerne discovered and worked with Traeger Grills to disclose a vulnerability in the company’s embedded Wi-Fi Controller that allows users to connect to and control their grills remotely.

Headshot with Alissa Gilbert and livestream title, "Come WiFind Me"
Livestream

Come WiFind Me: WiFi & Other RF Surveillance

Join Alissa Gilbert (dnsprincess) as she dispels myths around RF tracking, negates some fears, and gives completely new ones in its place.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.