Featured Resource

Bishop Fox Livestream at DEF CON 32

Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.

Adversarial Controls Testing Methodology cover page preview on dark background.
Methodology

Bishop Fox Adversarial Controls Testing Methodology

Download our methodology document to learn about our adversarial, attack-based approach to testing your key security controls.

Bishop Fox Livestream RSAC 2024 Application Security
Livestream

Livestream at RSAC 2024 on Application Security Strategies for Modern Enterprises

At Bishop Fox's second-annual livestream from the 2024 RSA Conference in San Francisco, we interviewed special guests to explore their insights on scaling application security programs, meeting developer needs, and leveraging AI and machine learning for security.

Black and dark purple background with speaker headshot on left side. Teal background in speaker headshot. White and teal letters.
Livestream

GWT Java Deserialization: Unpatched and Unauthenticated

Watch our exclusive livestream with Ben Lincoln, Managing Principal at Bishop Fox, to learn about GWT web application vulnerabilities, exploitation strategies, and security enhancement recommendations.

Managed Security Service: Cosmos Application Penetration Testing (CAPT) datasheet pages floating on dark background.
Datasheet

Cosmos Application Penetration Testing (CAPT) Datasheet

Learn how to strengthen the security of your critical business applications with authenticated assessments that uncover the full spectrum of exposures above and below the surface.
2024 Q2 CAPT Methodology Digital Tile
Methodology

Cosmos Application Penetration Testing Methodology

This methodology document provides an overview of Bishop Fox's Cosmos Application Penetration Testing engagements.

Training session title: Swagger Jacker Training about improved auditing of OpenAPI Definition Files with the headshot os security consultant Tony West, a Bishop Fox adversarial operator.
Livestream

Swagger Jacker: Improved Auditing of OpenAPI Definition Files

Discover the power of Swagger Jacker, an open-source audit tool designed to improve inspection of unintentionally exposed OpenAPI definition files for penetration testers.

Subscribe to Bishop Fox's Security Blog

Be first to learn about latest tools, advisories, and findings.

Purple gradient background with headshot of speaker on left side.
Livestream

OWASP ASVS: Unlocking Stronger Application Security

Join offensive security expert Shanni Prutchi in this livestream as she shares her analysis of the 278 verification requirements listed in OWASP's Application Security Verification Standard (ASVS). Learn how to generate test cases and gain insights to effectively test your applications against the standard.

Dark purple background with headshots of speakers Erez Yalon, Vandana Verma, and Joylynn Kirui, Bishop Fox logo, and title: The Art of Hacking, Hacker's Arsenal in AppSec.
Livestream

"Hacker's Arsenal in AppSec" Session - DEF CON 31

In this session, we investigate how applications are the beating heart of the digital realm, and as hackers, we know just how to make them skip a beat.

OWASP ASVS Demystified digital guide on purple lock background.
Guide

OWASP ASVS Demystified: A Practical Guide to Web Application Security Testing

In this technical guide, offensive security expert Shanni Prutchi provides analysis of the entire 278 verification requirements listed in OWASP's ASVS standard to assist in the generation of test cases and provide context to companies looking to test their applications against the standard.

Cover pages of the Bishop Fox Secure Code Review on dark background.
Datasheet

Secure Code Review Datasheet

Learn how secure code review combines cutting-edge automation with meticulous manual review, ensuring the full spectrum of code-base vulnerabilities are proactively eliminated before attackers have a fighting chance.
Preview of the cover pages of the Hybrid Application Security Assessment datasheet on dark background.
Datasheet

Hybrid Application Assessment Datasheet

Learn how to uncover the full spectrum of application security risks and code-level vulnerabilities with automated and manual testing methods.
Preview of the Application Security Portfolio Datasheet on dark background.
Datasheet

Application Security Portfolio Datasheet

From strategic engagements that integrate security across the software development life cycle, to manual and automated testing, our experts uncover tactical and strategic security issues that real-world adversaries specifically target.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.