Join Bishop Fox for a fireside chat with renowned cybersecurity experts – Evan Wolff & Justin Greis. We’ll discuss how new proposed regulations will impact offensive security initiatives, both short- and long-term.
Getting Red Teaming Right: A How-to Guide
Read our eBook to learn how Red Teaming can provide the ultimate training ground for your defenses, assessing how well (or not) intrusions are detected and how an attacker can move throughout your network to achieve exfiltration.
Get the Blueprint: Insights from Ponemon Institute’s 2023 State of Offensive Security Study
Hear from experts Larry Ponemon & Tom Eston, as they reveal our findings from a joint report with the Ponemon Institute on the 'State of Offensive Security' in 2023.
OWASP ASVS Demystified: A Practical Guide to Web Application Security Testing
In this technical guide, offensive security expert Shanni Prutchi provides analysis of the entire 278 verification requirements listed in OWASP's ASVS standard to assist in the generation of test cases and provide context to companies looking to test their applications against the standard.
IDC Spotlight - Continuous Prevention: How Attack Surface Management Reduces Risk
Get new analyst insights on the benefits of continuous testing.
Notes from the Dark Side: What Our Data Reveals About the Attack Surface
Join our offensive security experts as they share insights gleaned from analyzing twelve months of findings captured in Cosmos, our award-winning attack surface management platform.
Tool Talk: Burp Suite Extensions
Learn how to power up web application security testing with tips on creating customized extensions featuring BurpCage, an extension that replaces any image proxied through Burp Suite leveraging the Montoya API.
Subscribe to Bishop Fox's Security Blog
Be first to learn about latest tools, advisories, and findings.
Thank You! You have been subscribed.
Cybersecurity Style Guide v2.0
Designed for security researchers, this guide is an invaluable resource for advice on which cybersecurity terms to use in reports and how to use them correctly.
2023 GigaOm Radar for Attack Surface Management
This report is one of a series of documents that helps IT organizations assess competing Attack Surface Management solutions in the context of well-defined features and criteria.
2023 GigaOm Radar Webcast: Attack Surface Management
Join us to learn how to choose the right ASM solution for your needs and how new ASM solutions can help you improve your overall security posture.
SANS Institute: Inside the Minds & Methods of Modern Adversaries
To stay ahead of a hacker, you need to think like one. In groundbreaking new research, SANS and Bishop Fox surveyed more than 300 ethical hackers to gain insight into how attackers think, the tools they use, their speed, specialization, and favorite targets.
The Offensive Security Guide to Ransomware Readiness
Our ransomware readiness guide helps you understand your current state of ransomware readiness, prepare for ransomware attacks, identify gaps in your current strategy, and measure progress to continually enhance readiness.
Fortifying Your Applications: A Guide to Penetration Testing
Download this eBook to explore key aspects of application penetration testing, questions to ask along the way, how to evaluate vendors, and our top recommendations to make the most of your pen test based on almost two decades of experience and thousands of engagements.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.