Hear from experts Larry Ponemon & Tom Eston, as they reveal our findings from a joint report with the Ponemon Institute on the 'State of Offensive Security' in 2023.
News Insights: Patch Procrastination with Trevin Edgeworth, Director of Red Team
Bishop Fox's Red Team Director, Trevin Edgeworth, spotlights two notable vulnerabilities - left unpatched for years on end and discusses how unpatched vulnerabilities can wreak havoc on businesses. One, an unpatched six-year-old flaw in Microsoft Office, the other in Google Web Toolkit (GWT), unaddressed for eight years.
How Does Social Engineering Work? From Planning to Execution
Join our webcast as we navigate the complex terrain of social engineering, offering insights into its various stages from planning to execution, common phishing techniques, and the necessity of ongoing vigilance and proactive strategies to combat this pervasive issue.
Red Team Datasheet
Learn how our engagements align to your targeted outcomes, purpose-built to emulate specific attack types, worrisome adversary groups, and emerging tactics that present the greatest risk to your environment. |
Purple Teaming for Security Success: Enhancing ROI and Facilitating Growth
In this webcast, uncover how purple teaming initiatives can transform cybersecurity from a perceived cost center to a revenue-protecting asset. Ryan Basden, Red Team security consultant, will guide you through establishing security baselines, validating investments, and formulating a roadmap for organizational growth.
Bridging the Gap: Integrating Tabletop Exercises and Red Teaming for Seamless Incident Response
Hear from Shanni Prutchi, Security Consultant III, to learn about enhancing your organization's incident response capabilities through combined red teaming and tabletop exercises. Explore attack detection, response, and the importance of established processes.
Combatting Adversaries: Proactive Social Engineering & Network Testing
Join us for a fireside chat that illuminates the importance of proactive social engineering defense and the key role of internal network testing in orchestrating a successful counteroffensive against cyberattacks.
Subscribe to Bishop Fox's Security Blog
Be first to learn about latest tools, advisories, and findings.
Thank You! You have been subscribed.
Red Teaming: The Essential Tool for Security Leaders
Join Trevin Edgeworth, Red Team Practice Director at Bishop Fox, as he sheds light on why Red Teaming has become the ultimate "sanity check" for security team leaders.
"Red Teaming" Session - DEF CON 31
In this session, learn the secrets of stealthy infiltration, master the latest attack vectors, and discover how to communicate your findings like a true hacker.
Getting Red Teaming Right: A How-to Guide
Read our eBook to learn how Red Teaming can provide the ultimate training ground for your defenses, assessing how well (or not) intrusions are detected and how an attacker can move throughout your network to achieve exfiltration.
Bishop Fox Social Engineering Methodology
Download our methodology to see how we approach social engineering engagements.
Bishop Fox Tabletop Exercise Methodology
Download our methodology to see how we approach Incident Response Tabletop Exercise engagements.
Social Engineering Datasheet
Learn how social engineering goes beyond conventional phishing exercises to explore the depths of how adversaries can exploit your users, empowering you with insights to improve your security awareness program and related controls like email and file security. |
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.