Executive brief on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing. Watch Now

Featured Customer Story

Red Team Activated: Testing a Global Risk Intelligence Platform

To ensure its real-time AI platform could withstand sophisticated threats, a global SaaS company partnered with Bishop Fox for its first full red team assessment.

Google partnered with Bishop Fox to design a security assessment program for their G Suite partners.
Customer Story

Scaling up Google's Third-Party Security Program

When Google needed to ensure that their user data was being handled securely, they partnered with Bishop Fox to design a security assessment program that could validate the security posture of their 1,000+ G Suite partners. The result: the largest and most successful public third-party ecosystem testing program ever.
Sonos engaged Bishop Fox to secure their new voice-enabled speaker. Sonos Makes Secure Moves with Bishop Fox.
Customer Story

Sonos Makes Secure Moves with Bishop Fox

Secured a new voice-enabled speaker at launch by integrating security testing into every stage of development.

Customer Story on how Wickr augment and prove the security of their products and services.
Customer Story

Wickr: How Bishop Fox Enables Wickr's Security Assurance

Validated products against real-world attack scenarios, delivering the transparency and assurance promised to customers.

Customer Story on Secure Code Review and Hybrid Application Security Assessment.
Customer Story

Securing Boost.Beast

A Non-Traditional Source Code Review Securing the Foundation of Thousands of Web Applications.
Coinbase implements an effective bug bounty program to improve site security.
Customer Story

Coinbase: Managing Security Through Collaboration

Combining the HackerOne Platform with Bishop Fox Security Consultants.
This customer story covers how Change Healthcare evolved their security posture.
Customer Story

Change Healthcare: Securing a Competitive Advantage

As their business expanded, we were there to help Change Healthcare grow and evolve their security posture.
Bluebox (now Lookout) secures their Mobile Security Application.
Customer Story

Securing Mobile Security with Bluebox

Software Security Meets Cybersecurity. Bluebox needed a vendor to conduct a mobile security assessment of their solution. Bishop Fox established that security was the foundation of their software.
Iotium case study card
Customer Story

Iotium: Securing an Industrial IoT Platform

IoTium, a solution designed for the Industrial Internet of Things (IIoT), enlisted Bishop Fox to verify the security of their product offering.

Customer story on how Bishop Fox helps Wickr build a healthy security program.
Customer Story

Zephyr Health: Building a Healthy Security Program

Designed a security program that meets the highest privacy standards to protect sensitive patient health data.

August Home customer story on IoT devices security. August: Built-in Security in IoT Devices.
Customer Story

August: Built-in Security in IoT Devices

Secured a new voice-enabled speaker at launch by integrating security testing into every stage of development.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.