Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.
How Does Social Engineering Work? From Planning to Execution
Join our webcast as we navigate the complex terrain of social engineering, offering insights into its various stages from planning to execution, common phishing techniques, and the necessity of ongoing vigilance and proactive strategies to combat this pervasive issue.
Cosmos Datasheet
| Learn how Cosmos combines attack surface management with expert-driven penetration testing to help security teams identify and remediate dangerous exposures before attackers can exploit them. |
Cosmos Attack Surface Management (CASM) Datasheet
| Learn how this innovative managed service combines advanced attack surface technology with expert-driven testing to help you quickly close the window of vulnerability and strengthen resilience against ever-changing threats. |
CloudFoxable: A Practical Demo of AWS Cloud Security Misconfiguration Attacks
Watch the CloudFoxable demo to see a gamified cloud hacking sandbox where users can find latent attack paths in an intentionally vulnerable AWS environment.
The New CISO Special: Organizing the Chaos in Your First 100 Days
With Senior Solutions Architect Matt Twells, Bishop Fox offers a comprehensive guide to ease into your role confidently, providing a strategic framework to streamline your initial efforts.
Cloud Security Podcast: Cloud Pen Test of AWS with Open Source
Hear from Bishop Fox's Seth Art in Episode 161 of Cloud Security Podcast as he shares his extensive experience with cloud penetration testing.
News Insights: 23AndMe with Alethe Denis, Security Expert - Red Team
Alethe Denis, a Bishop Fox Senior Red Team consultant and Social Engineering expert, reveals her quick-take perspective on what she sees as different about the 23AndMe breach, and how it’s viewed by someone who is a career social engineer.
Red Team Datasheet
| Learn how our engagements align to your targeted outcomes, purpose-built to emulate specific attack types, worrisome adversary groups, and emerging tactics that present the greatest risk to your environment. |
A Practical Guide to Operationalizing the FDA's 2023 Cybersecurity Requirements
Join our webcast with Matt Twells to understand the impact of the FDA's HR.2617 legislation on medical device cybersecurity, learn how to build a robust plan, address vulnerabilities, manage supply chain risks, and anticipate future trends.
Cloud Security Podcast: Network Pentest 2.0 - The Cloud Pentest Revolution
Cloud configuration review is not a cloud security pen test! Seth Art clarifies the myth on this episode of Cloud Security Podcast.
Purple Teaming for Security Success: Enhancing ROI and Facilitating Growth
In this webcast, uncover how purple teaming initiatives can transform cybersecurity from a perceived cost center to a revenue-protecting asset. Ryan Basden, Red Team security consultant, will guide you through establishing security baselines, validating investments, and formulating a roadmap for organizational growth.
Pentest Tools Podcast: We Think We Know How to Explain the Value of a Penetration Test
Hear from Bishop Fox's Alethe Denis in the first episode of Pentest Tool's 'We Think We Know' podcast to unravel the intricacies of security testing.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.