AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Bishop Fox Red Team Readiness Assessment resource image, featuring bold red and gray text over a black background and a preview of a planning questionnaire for red team engagement objectives.
Guides

Red Team Readiness Assessment

The Red Team Readiness Assessment is a guided self-assessment worksheet that helps security teams evaluate their preparedness, align stakeholders, and plan more effective Red Team engagements. Use it to define objectives, set scope, and establish the protocols needed for a successful simulation.

Read Guide
Promotional banner for virtual session titled 'Breaking AI: Inside the Art of LLM Pen Testing' featuring stylized graphics of a laptop and glitch art design elements.
Virtual Sessions

Breaking AI: Inside the Art of LLM Pen Testing

Learn why traditional penetration testing fails on LLMs. Join Bishop Fox’s Brian D. for a deep dive into adversarial prompt exploitation, social engineering, and real-world AI security techniques. Rethink how you test and secure today’s most powerful models.

Watch Session
Bold graphic with black background promoting a Sliver Framework workshop titled 'Sliver: Staging & Automation'; features white and neon yellow text, Sliver logo in a white box, and digital glitch-style accents in magenta, cyan, and yellow on the edges.
Workshops & Training

Sliver Workshop Part 2: Staging & Automation

In our second workshop, we’ll explore Sliver’s new implant staging process and demonstrate basic CLI automation features. We’ll also walk through Sliver’s supported pivot types for lateral movement, including TCP, and wrap up by exploring automation options using the SliverPy project.

Watch Workshop
bfx25_Red team solution brief ft
Solution Briefs

Red Team & Adversarial Emulation Solution Brief

With a range of approaches that simulate breach scenarios at your organization, adversarial emulation is the most effective way to know if your team is prepared to detect, respond, and recover—before a real breach happens.

Read Briefing
Virtual session titled 'Architecting Cloud Security Testing in the GenAI Era' featuring modern typography and abstract technical design elements.
Virtual Sessions

Architecting Cloud Security Testing in the GenAI Era

Join Steven Smiley and Jessica Stinson for a deep dive into how early-stage architectural reviews can transform the effectiveness of your testing. Whether you're navigating IAM setups or preparing to tackle GenAI risks in cloud environments, this session has the clarity and direction you need to test smarter—not just harder.

Watch Session
Sliver Framework Getting Started and 1.6 Features Event image with Bishop Fox branding.
Workshops & Training

Sliver Workshop Part 1: Getting Started & 1.6 Features

Watch an interactive workshop led by Bishop Fox Senior Security Consultant, Tim Ghatas, as we dive into Sliver, the open-source C2 framework making waves in Red Team ops.

Watch Workshop
Interview: PCI DSS 4.0 Offensive Security Requirements Expert Breakdown virtual session with Bishop Fox branding.
Executive Briefing

Panel: PCI DSS 4.0 Expert Breakdown

This executive brief features an expert discussion focusing on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing.

Read Briefing
Attacking & Defending Deepfakes: A Red Teamer’s Perspective featured image with Bishop Fox new branding of easter eggs.
Virtual Sessions

Attacking & Defending Deepfakes: A Red Teamer’s Perspective

Explore the offensive and defensive use of deepfake technology in cybersecurity with Bishop Fox red teamer Brandon Kovacs. This session dives into real-world attack simulations, red team methodologies, and practical mitigation strategies for organizations facing the rapidly growing threat of deepfakes.

Watch Session
Attack Surface Management Measuring Real World Impact Webcast featured image.
Virtual Sessions

Attack Surface Management: Measuring Real-World Impact

Our experts explain how to tell if your ASM is effective, what teams often miss, and why it’s more than just tracking known vulnerabilities.

Watch Session
Screenshot of
Virtual Sessions

The Promise and Perils of AI: Navigating Emerging Cyber Threats - A Dark Reading Panel

This video showcases leading voices in cybersecurity explaining their examinations into how AI is simultaneously transforming cyber defense and supercharging attacker capabilities. Together, they explored how GenAI is reshaping the threat landscape and what security leaders must do to adapt.

Watch Session
Panel discussion on building cybersecurity companies featuring women leaders Christie Terrill of Bishop Fox, Deidre Diamond of CyberSN, and Juliet Okafor of RevolutionCyber.
Virtual Sessions

Building Cybersecurity Companies: Stories and Lessons from Two Women Founders

Christie Terrell, CISO at Bishop Fox, interviews Deidre Diamond, Founder & CEO of CyberSN and Founder of Secure Diversity, and Juliet Okafor, Founder & CEO of RevolutionCyber about their experiences founding their own companies in the cybersecurity industry.

Watch Session
District Con 2025 Decryption Firmware with Sonicrack video logo with play button.
Technical Briefings

Tearing Down (Sonic)Walls: Reverse-Engineering SonicOSX Firmware Encryption

Researchers walk through cracking SonicOSX: extracting keys, decrypting firmware, and analyzing its architecture at DistrictCon 2025.

Read Briefing
Preview of the managed penetration testing services datasheet.
Datasheets

Managed Penetration Testing Service Datasheet

Learn how to minimize the complexity and maximize the effectiveness of large security testing initiatives with our comprehensive program management.

Download Datasheet
Jon Williams headshot for new Tomcat CVE-2025-24613 video with Bishop Fox branding.
Technical Briefings

Tomcat CVE-2025-24813: What You Need to Know

A breakdown of CVE-2025-24813 in Apache Tomcat—what it is, who’s actually at risk, and why most users likely aren’t affected. Keep calm and patch your servers.

Read Briefing
Black and white vintage historical sign of Deadwood, South Dakota
Virtual Sessions

Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security

Watch Alethe Denis, Senior Security Consultant, for an engaging deep dive into the world of Red Teaming. Through real-life stories and expert analysis, this webcast will explore the triumphs, missteps, and critical takeaways from Red Team engagements.

Watch Session
Cover page of the datasheet for the Cosmos integration with Jira.
Datasheets

Cosmos Integration for Jira Datasheet

Learn how to effortlessly sync validated exposures from the Cosmos portal into your Jira environment to streamline vulnerability management and remediate dangerous exposures before attackers can exploit them.

Download Datasheet
2025 attack surface management (ASM) Fast mover recognition between best ASM vendors.
Reports

2025 GigaOm Radar for Attack Surface Management

Get an overview of the Attack Surface Management (ASM) market — along with the key features and business criteria met by the top solutions — and learn why Bishop Fox was named a Fast Mover by the analysts at GigaOm.

Read Report
Webcast preview card with Trevin Edgeworth headshot
Virtual Sessions

Red Teaming: Is Your Security Program Ready for the Ultimate Test?

In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.

Watch Session
Video thumbnail with Jon Williams headshot for the new SonicWall CVE-2024-53704 and Bishop Fox branded play button.
Technical Briefings

SonicWall-CVE2024-53704: Exploit Details

Watch a quick explainer of Bishop Fox's successful exploit of SonicWall CVE-2024-53704.

Read Briefing
Video Alethe Denis WWHF 2024
Virtual Sessions

Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security

Senior Security Consultant Alethe Denis takes audiences on a riveting journey into the realm of Red Teaming through captivating narratives and insightful analysis.

Watch Session
Presentation slide titled ‘Patch Perfect: Harmonizing with LLMs to Find Security Vulns’ by Bishop Fox, featuring Caleb Gross and Josh Shomo, shown at RVAsec cybersecurity conference.
Workshops & Training

Patch Perfect: Harmonizing with LLMs to Find Security Vulns

This talk led by Bishop Fox researchers Caleb Gross & Josh Shomo cuts through the hype and offers a practical perspective that’s grounded in real-world analysis of critical bugs in widely used products.

Watch Workshop
Cosmos video demo tile
Solution Briefs

Cosmos Explained: The People and the Platform Empowering Security Teams

See how Cosmos combines attack surface technology and expert testing in a fully managed service to strengthen your security posture while reducing the burden on your teams.

Read Briefing
Tech brief 1 Tile Featured Card
Technical Briefings

Technical Brief on PAN-OS Vulnerability & SonicWall SWI Firmware Decryption

Exclusive Bishop Fox client briefing: Insights into PAN-OS vulnerability (CVE-2024-0012) with Q&A and advanced threat detection strategies.

Read Briefing
2025 Q1 DIGITAL SB PPT Tilewebp
Datasheets

Physical Penetration Testing Datasheet

Learn how our customized Red Team assessments identify security gaps in your physical, process, and human controls so you can fortify your defenses.

Download Datasheet

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.