Bishop Fox named “Leader” in 2024 GigaOm Radar for Attack Surface Management. Read the Report ›

Featured Resource

Get the Blueprint: Insights from Ponemon Institute’s 2023 State of Offensive Security Study

Hear from experts Larry Ponemon & Tom Eston, as they reveal our findings from a joint report with the Ponemon Institute on the 'State of Offensive Security' in 2023.

Video player with Trevin Edgeworth, Red Team Practice Director
Video

News Insights: Patch Procrastination with Trevin Edgeworth, Director of Red Team

Bishop Fox's Red Team Director, Trevin Edgeworth, spotlights two notable vulnerabilities - left unpatched for years on end and discusses how unpatched vulnerabilities can wreak havoc on businesses. One, an unpatched six-year-old flaw in Microsoft Office, the other in Google Web Toolkit (GWT), unaddressed for eight years.

Headshot of Dardan Prebreza, senior security consultant and webcast title: "How does social engineering works? From planning to execution"
Webcast

How Does Social Engineering Work? From Planning to Execution

Join our webcast as we navigate the complex terrain of social engineering, offering insights into its various stages from planning to execution, common phishing techniques, and the necessity of ongoing vigilance and proactive strategies to combat this pervasive issue.

Preview of the red team datasheet cover pages on dark background.
Datasheet

Red Team Datasheet

Learn how our engagements align to your targeted outcomes, purpose-built to emulate specific attack types, worrisome adversary groups, and emerging tactics that present the greatest risk to your environment.
Webcast title: Purple Teaming for Security Success with headshot of speaker, Ryan Basden.
Webcast

Purple Teaming for Security Success: Enhancing ROI and Facilitating Growth

In this webcast, uncover how purple teaming initiatives can transform cybersecurity from a perceived cost center to a revenue-protecting asset. Ryan Basden, Red Team security consultant, will guide you through establishing security baselines, validating investments, and formulating a roadmap for organizational growth.

Bridging the Gap Integrating Tabletop Exercises and Red Teaming for Seamless Incident Response with purple background and Bishop Fox logo.
Video

Bridging the Gap: Integrating Tabletop Exercises and Red Teaming for Seamless Incident Response

Hear from Shanni Prutchi, Security Consultant III, to learn about enhancing your organization's incident response capabilities through combined red teaming and tabletop exercises. Explore attack detection, response, and the importance of established processes.

Webcast title with speakers' headshot: Combatting Adversaries: Proactive Social Engineering & Network Testing.
Webcast

Combatting Adversaries: Proactive Social Engineering & Network Testing

Join us for a fireside chat that illuminates the importance of proactive social engineering defense and the key role of internal network testing in orchestrating a successful counteroffensive against cyberattacks.

Subscribe to Bishop Fox's Security Blog

Be first to learn about latest tools, advisories, and findings.

Red Teaming webcast title with headshot of speaker, Trevin Edgeworth, Red Team Practice Director.
Webcast

Red Teaming: The Essential Tool for Security Leaders

Join Trevin Edgeworth, Red Team Practice Director at Bishop Fox, as he sheds light on why Red Teaming has become the ultimate "sanity check" for security team leaders.

Video thumbnail featuring the three panelists: Barrett Darnell, Savannah Lazzara, and Wesley Thurner.
Livestream

"Red Teaming" Session - DEF CON 31

In this session, learn the secrets of stealthy infiltration, master the latest attack vectors, and discover how to communicate your findings like a true hacker.

Preview of Bishop Fox Red teaming Guide cover page on dark purple background.
Guide

Getting Red Teaming Right: A How-to Guide

Read our eBook to learn how Red Teaming can provide the ultimate training ground for your defenses, assessing how well (or not) intrusions are detected and how an attacker can move throughout your network to achieve exfiltration.

Preview of Bishop Fox Social Engineering methodology.
Methodology

Bishop Fox Social Engineering Methodology

Download our methodology to see how we approach social engineering engagements.

Preview of the Incident Response Tabletop Exercise Methodology by Bishop Fox.
Methodology

Bishop Fox Tabletop Exercise Methodology

Download our methodology to see how we approach Incident Response Tabletop Exercise engagements.

Cover pages of the Bishop Fox social engineering datasheet.
Datasheet

Social Engineering Datasheet

Learn how social engineering goes beyond conventional phishing exercises to explore the depths of how adversaries can exploit your users, empowering you with insights to improve your security awareness program and related controls like email and file security.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.