In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.
Adversarial Controls Testing Datasheet
Learn how Adversarial Controls Testing uses an attack-based approach mapped to the MITRE ATT&CK framework to determine the effectiveness of your email/phishing, endpoint, and network security controls.
Bishop Fox Adversarial Controls Testing Methodology
Download our methodology document to learn about our adversarial, attack-based approach to testing your key security controls.
Livestream at RSAC 2024 on Application Security Strategies for Modern Enterprises
At Bishop Fox's second-annual livestream from the 2024 RSA Conference in San Francisco, we interviewed special guests to explore their insights on scaling application security programs, meeting developer needs, and leveraging AI and machine learning for security.
GWT Java Deserialization: Unpatched and Unauthenticated
Watch our exclusive livestream with Ben Lincoln, Managing Principal at Bishop Fox, to learn about GWT web application vulnerabilities, exploitation strategies, and security enhancement recommendations.
Cosmos Application Penetration Testing (CAPT) Datasheet
Learn how to strengthen the security of your critical business applications with authenticated assessments that uncover the full spectrum of exposures above and below the surface. |
Cosmos Application Penetration Testing Methodology
This methodology document provides an overview of Bishop Fox's Cosmos Application Penetration Testing engagements.
Subscribe to our blog and advisories
Be first to learn about latest tools, advisories, and findings.
Thank You! You have been subscribed.
Swagger Jacker: Improved Auditing of OpenAPI Definition Files
Discover the power of Swagger Jacker, an open-source audit tool designed to improve inspection of unintentionally exposed OpenAPI definition files for penetration testers.
OWASP ASVS: Unlocking Stronger Application Security
Join offensive security expert Shanni Prutchi in this livestream as she shares her analysis of the 278 verification requirements listed in OWASP's Application Security Verification Standard (ASVS). Learn how to generate test cases and gain insights to effectively test your applications against the standard.
"Hacker's Arsenal in AppSec" Session - DEF CON 31
In this session, we investigate how applications are the beating heart of the digital realm, and as hackers, we know just how to make them skip a beat.
OWASP ASVS Demystified: A Practical Guide to Web Application Security Testing
In this technical guide, offensive security expert Shanni Prutchi provides analysis of the entire 278 verification requirements listed in OWASP's ASVS standard to assist in the generation of test cases and provide context to companies looking to test their applications against the standard.
Secure Code Review Datasheet
Learn how secure code review combines cutting-edge automation with meticulous manual review, ensuring the full spectrum of code-base vulnerabilities are proactively eliminated before attackers have a fighting chance. |
Hybrid Application Assessment Datasheet
Learn how to uncover the full spectrum of application security risks and code-level vulnerabilities with automated and manual testing methods. |
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.