Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.
Secure Code Review Datasheet
| Learn how secure code review combines cutting-edge automation with meticulous manual review, ensuring the full spectrum of code-base vulnerabilities are proactively eliminated before attackers have a fighting chance. |
Hybrid Application Assessment Datasheet
| Learn how to uncover the full spectrum of application security risks and code-level vulnerabilities with automated and manual testing methods. |
Architecture Security Assessment Solution Brief
Learn how our assessment puts your applications and underlying security architecture under the microscope, illuminating critical flaws and systemic improvements that enhance existing security controls and harden defenses against the speed and precision of modern adversaries. |
Application Security Portfolio Datasheet
| From strategic engagements that integrate security across the software development life cycle, to manual and automated testing, our experts uncover tactical and strategic security issues that real-world adversaries specifically target. |
Application Penetration Testing Datasheet
| Learn how our experts conduct application penetration testing, using manual and automated testing methods, to discover critical vulnerabilities and logic flaws. |
Application Penetration Testing Packages Datasheet
Maximize protection, minimize risk, and scale security testing across your growing application portfolio with our penetration testing packages. With three levels of testing to choose from, you can prioritize risk and improve your security posture by assessing more applications for comprehensive coverage. |
Fortifying Your Applications: A Guide to Penetration Testing
Download this eBook to explore key aspects of application penetration testing, questions to ask along the way, how to evaluate vendors, and our top recommendations to make the most of your pen test based on almost two decades of experience and thousands of engagements.
Shifting Left: A DevSecOps Field Guide
Our eBook offers practical recommendations on how developers and security teams alike can move towards a DevSecOps model in any organization – with a goal of shared responsibility and creating a perpetual and repeatable process.
CVE Spotlight: Breaking Down Zimbra’s RCE Vulnerabilities
Watch the inaugural episode of our What the Vuln livestream series as we examine Zimbra Zip Path Traversal vulnerabilities, CVE-2022-27925 and CVE-2022-37042.
Application Security: Getting the Most Out of Your Penetration Tests
Learn how to make the most of your application pen test and implement steps for repetitive secure application design in the future.
Bishop Fox Secure Code Review Methodology
Overview of Bishop Fox’s methodology for Secure Code Review.
Cracking the Code: Secure Code Review in DevSecOps
On-demand webcast offers an in-depth look at how DevOps can integrate both automated and manual code review into the software development lifecycle.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.