AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Featured Resource

LLM-Assisted Vulnerability Research

Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.

Cosmos for ServiceNow datasheet cover page.
Datasheet

Cosmos for ServiceNow Datasheet

Learn how to effortlessly sync validated exposures from the Cosmos portal into your ServiceNow environment to streamline vulnerability management and remediate dangerous exposures before attackers can exploit them.
Bishop Fox Cosmos Service Now Demo
Solution Brief

Cosmos Integration with ServiceNow® Demo

Watch this video to see how you can streamline vulnerability management — from identification to remediation — with Cosmos integration for ServiceNow.

Cosmos Jira integration demo tile
Solution Brief

Cosmos Integration with Jira Demo

Watch this video to see how you can streamline vulnerability management — from identification to remediation — with Cosmos integration for Jira®.

Mockup of Bishop Fox's Guide to DORA Threat-Led Pen Testing
Guide

FAQ Guide: Acquiring DORA Threat-Led Penetration Testing

Bishop Fox’s comprehensive DORA FAQ guide walks you through everything you need to know about fulfilling these critical requirements. This resource is a must-have for financial institutions looking to stay ahead of DORA’s complex compliance landscape.

video thumnail of DragonJAR Forum organizers and Hector Cruz.
Virtual Session

Red vs Blue: Building a Well-Rounded Cybersecurity Career Path

Hear from Héctor Cuevas Cruz as he shares his career from early days in DragonJAR forum to how he's become a team leader of hackers for Bishop Fox.

Headshot of Senior Security Consultant Brandon Kovacs
Virtual Session

Cyber Mirage: How AI is Shaping the Future of Social Engineering

In this webcast, Senior Security Consultant Brandon Kovacs aims to illuminate the sophisticated capabilities that AI brings to the table in creating hyper-realistic deepfakes and voice clones.

Bishop Fox Adversarial Controls Testing Methodology preview on dark background.
Methodology

Bishop Fox Adversarial Controls Testing Methodology

Get detailed insights into how Bishop Fox conducts Adversarial Controls Testing (ACT) engagements. This comprehensive methodology document outlines the step-by-step process, collaboration model, example test cases, and delineation of responsibilities critical to validating your security controls.

Bishop Fox Application Penetration Testing Packages Methodology preview on dark background.
Methodology

Bishop Fox Application Penetration Testing Packages Methodology

Download Bishop Fox's app pen testing packages methodology. Learn our Baseline, Standard, and Advanced approaches to scaling security testing coverage.

2024 Q3 Livestream Def Con General Tile
Virtual Session

Bishop Fox Livestream at DEF CON 32

Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.

Traeger video with headshot of Nick Cerne with Bishop Fox logo.
Workshops & Training

Smart Grills Get Smarter: Improving IoT Security One Device at a Time

Bishop Fox Security Consultant, Nisk Cerne discovered and worked with Traeger Grills to disclose a vulnerability in the company’s embedded Wi-Fi Controller that allows users to connect to and control their grills remotely.

Headshot with Alissa Gilbert and livestream title, "Come WiFind Me"
Workshops & Training

Come WiFind Me: WiFi & Other RF Surveillance

Join Alissa Gilbert (dnsprincess) as she dispels myths around RF tracking, negates some fears, and gives completely new ones in its place.

Bishop Fox Livestream RSAC 2024 IAM in Cloud Environments
Virtual Session

Navigating the IAM Maze: Expert Strategies for Cloud Identity Security

In this expert-led session, security leaders discuss the critical challenges and solutions for managing identities in complex cloud environments. Learn how to tackle machine identities, implement continuous hygiene practices, and leverage AI for enhanced security posture.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.