Featured Resource

Bishop Fox Livestream at DEF CON 32

Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.

Preview of the Bishop Fox Application Penetration Testing datasheet on dark background.
Datasheet

Application Penetration Testing Datasheet

Learn how our experts conduct application penetration testing, using manual and automated testing methods, to discover critical vulnerabilities and logic flaws.
image of purple eBook cover with blue text and white page with graphs on dark background
Guide

Fortifying Your Applications: A Guide to Penetration Testing

Download this eBook to explore key aspects of application penetration testing, questions to ask along the way, how to evaluate vendors, and our top recommendations to make the most of your pen test based on almost two decades of experience and thousands of engagements.

A cover report imagery with charts and infinity ring
Guide

Shifting Left: A DevSecOps Field Guide

Our eBook offers practical recommendations on how developers and security teams alike can move towards a DevSecOps model in any organization – with a goal of shared responsibility and creating a perpetual and repeatable process.

Bishop Fox Livestream Zimbra Tile
Webcast

What the Vuln: Zimbra

Watch the inaugural episode of our What the Vuln livestream series as we examine Zimbra Zip Path Traversal vulnerabilities, CVE-2022-27925 and CVE-2022-37042.

Application Security webcast: Getting the Most of your Pen Test with Dan Petro headshot
Webcast

Application Security: Getting the Most Out of Your Penetration Tests

Learn how to make the most of your application pen test and implement steps for repetitive secure application design in the future.

Preview of Bishop Fox Secure Code Review Methodology cover page on dark purple background.
Methodology

Bishop Fox Secure Code Review Methodology

Overview of Bishop Fox’s methodology for Secure Code Review.

Bishop Fox Webcast Cracking the code with Secure Code Review hosted by Chris Bush
Webcast

Cracking the Code: Secure Code Review in DevSecOps

On-demand webcast offers an in-depth look at how DevOps can integrate both automated and manual code review into the software development lifecycle.

Bishop Fox on-demand webcast on Threat Modeling in DevSecOps presented by security experts Tom Eston and Chris Bush
Webcast

What Bad Could Happen? Managing Application Risk with Threat Modeling

What if security could become an integral framework within the software development process? Join Tom Eston and Chris Bush to learn how Threat Modeling is changing the way organizations manage application security risks.

DevSecOps and Application Penetration Testing: Defying the Myth.
Webcast

DevSecOps and Application Penetration Testing: Defying the Myth

On-demand webcast dives into the role of application penetration testing in today’s software development lifecycle (SDLC).

Illustration of computer exporting data

Fuzzing: Get the buzz on fuzz testing in software development

This slide deck includes:

  • Fuzzing Basics
  • How Fuzzing Works
  • Popular Fuzzing Tools
Cover slide of presentation: What Bad could Happen? Managing Application risk with Threat Modeling

Managing Application Security Risk with Threat Modeling

2023 Q1 DIGITAL Methodology HAA FI Tile
Methodology

Bishop Fox Hybrid Application Assessment Methodology

Overview of Bishop Fox’s methodology for hybrid application penetration testing.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.