Gain in-depth view into DORA’s threat-led penetration testing framework with practical guidance on how to integrate offensive security services.
Livestream: Bridging the Gap Between Military and Civilian Work
Tune into our livestream session to hear Skillbridge cybersecurity success stories.
Tool Talk: CloudFox
Watch as we explore Bishop Fox’s very own CloudFox, a command line tool that helps offensive security practitioners navigate unfamiliar cloud environments and find exploitable attack paths in cloud infrastructure. Tune in to our livestream for a demo of CloudFox!
The Mind Behind Nuclei, Demo with Sandeep Singh
Join co-founder of ProjectDiscovery, Sandeep Singh, for a demo of the new Nuclei tool.
Tool Talk: Unredacter
In our fourth edition of the Tool Talk series, we dive into Unredacter, a tool created by Dan Petro, Lead Researcher at Bishop Fox, that takes redacted pixelized text and reverses it back to its original text.
Tool Talk: Nuclei
In our third edition of the Tool Talk series, we dive into the open-source tool Nuclei, a fast and customizable vulnerability scanner based on simple YAML-based DSL.
Application Security: Getting the Most Out of Your Penetration Tests
Learn how to make the most of your application pen test and implement steps for repetitive secure application design in the future.
2022 GigaOm Analyst Webcast: Everything You Need to Know About Attack Surface Management
Tune into our webcast to learn more about Attack Surface Management and tips for evaluating solutions. GigaOm analyst Chris Ray joins us to share his insights!
Tool Talks: Debugging Ruby Exploits
In our sixth edition of the Tool Talk series, we explore a new test harness for discovering and crafting Ruby exploits.
Achieving Warp Speed to Continuous Testing: How to Calculate ROI for your Business
Uncover your organization’s unique cost savings and risk mitigation strategy for a continuous offensive testing solution with our customized ROI calculation.
Combating Ransomware with an Offensive Roadmap
Examine your organization’s level of ransomware preparedness through the lens of offensive security considerations.
SC Media Special Event: Continuously Hacking Yourself
Explore the benefits of continually hacking yourself to discover new assets (including many you don’t even know you have) and their associated vulnerabilities.
Cracking the Code: Secure Code Review in DevSecOps
On-demand webcast offers an in-depth look at how DevOps can integrate both automated and manual code review into the software development lifecycle.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.