Hear from experts Larry Ponemon & Tom Eston, as they reveal our findings from a joint report with the Ponemon Institute on the 'State of Offensive Security' in 2023.
Incident Response Tabletop Datasheet
Learn how to enable your organization to accurately evaluate incident response readiness by immersing your key stakeholders in realistic and customized threat scenarios designed specifically for your business. |
The Offensive Security Guide to Ransomware Readiness
Our ransomware readiness guide helps you understand your current state of ransomware readiness, prepare for ransomware attacks, identify gaps in your current strategy, and measure progress to continually enhance readiness.
Ready or Not: A Ransomware Self-Assessment
Fill out Bishop Fox’s ransomware self-assessment to see how your program stacks up to rigorous offensive security preparation.
Ready or Not? Test Your Ransomware Defenses Against Real-World Playbooks
Join Bishop Fox experts Tom Eston, AVP of Consulting and Trevin Edgeworth, Red Team Practice Director as they breakdown why ransomware emulations are the best way to test your defenses.
Ransomware Emulations: Pressure-Testing Scenarios for Cybersecurity Defense Teams
Join us to learn how ransomware emulation provides safe testing scenarios to uncover ransomware susceptibility in your security environment.
Looking Toward the Cosmos: Making the Case for Continuous Offensive Security
Download this eBook to uncover the factors and inputs used in our customizable ROI calculator that are critical to making the business case for continuous offensive testing. The output of the calculator is intended to help you draw a direct line from investment to risk mitigation that can be communicated to both technical and non-technical decision makers.
Bishop Fox Red Team Methodology
This Red Team methodology document provides an overview of Bishop Fox's approach to Red Team engagements.
Ransomware Scenario Emulation Report with Illumio
Illumio, Inc. engaged Bishop Fox to measure the effectiveness of Illumio Core for blue teams to detect and contain a ransomware attack. The report details the findings identified during the course of the engagement, which started on March 10, 2022.
Breaking & Entering: A Pocket Guide for Friendly Remote Admins
This user-friendly guide offers a comprehensive offensive security roadmap for sysadmins, penetration testers, and other security professionals.
Twist & Shout: Ferris Bueller's Guide to Abuse Domain Permutations
Presentation from Sqr00t 2019 explores the ins and outs of domain abuse, and how to prevent it.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.