Bishop Fox named “Leader” in 2024 GigaOm Radar for Attack Surface Management. Read the Report ›

Featured Customer Story

John Deere Digital Security Journey: Securing Products Against Cyberattacks

To help ensure John Deere products are ready to withstand security threats, John Deere chooses Bishop Fox's Cosmos platform and product security reviews.

Customer Story on how Wickr augment and prove the security of their products and services.
Customer Story

Wickr: How Bishop Fox Enables Wickr's Security Assurance

When Wickr needed to prove that their products and services were secure, they turned to the experts at Bishop Fox to validate their security and provide the transparency pledged in their Customer Security Promises.
Customer Story on Secure Code Review and Hybrid Application Security Assessment.
Customer Story

Securing Boost.Beast

A Non-Traditional Source Code Review Securing the Foundation of Thousands of Web Applications.
Coinbase implements an effective bug bounty program to improve site security.
Customer Story

Coinbase: Managing Security Through Collaboration

Combining the HackerOne Platform with Bishop Fox Security Consultants.
This customer story covers how Change Healthcare evolved their security posture.
Customer Story

Change Healthcare: Securing a Competitive Advantage

As their business expanded, we were there to help Change Healthcare grow and evolve their security posture.
Bluebox (now Lookout) secures their Mobile Security Application.
Customer Story

Securing Mobile Security with Bluebox

Software Security Meets Cybersecurity. Bluebox needed a vendor to conduct a mobile security assessment of their solution. Bishop Fox established that security was the foundation of their software.
Iotium case study card
Customer Story

Iotium: Securing an Industrial IoT Platform

IoTium, a solution designed for the Industrial Internet of Things (IIoT), enlisted Bishop Fox to verify the security of their product offering.

Customer story on how Bishop Fox helps Wickr build a healthy security program.
Customer Story

Zephyr Health: Building a Healthy Security Program

When Zephyr Health needed help keeping sensitive Patient Health Information secure, they turned to Bishop Fox.
August Home customer story on IoT devices security. August: Built-in Security in IoT Devices.
Customer Story

August: Built-in Security in IoT Devices

Home Security Meets Cybersecurity to Secure Homes Without Introducing Backdoors to the Back Door.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.