AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Virtual Sessions

The Promise and Perils of AI: Navigating Emerging Cyber Threats - A Dark Reading Panel

The Promise and Perils of AI: Navigating Emerging Cyber Threats - A Dark Reading Panel

This video showcases leading voices in cybersecurity explaining their examinations into how AI is simultaneously transforming cyber defense and supercharging attacker capabilities. Together, they explored how GenAI is reshaping the threat landscape and what security leaders must do to adapt.

Watch Session
Virtual Sessions

Building Cybersecurity Companies: Stories and Lessons from Two Women Founders

Building Cybersecurity Companies: Stories and Lessons from Two Women Founders

Christie Terrell, CISO at Bishop Fox, interviews Deidre Diamond, Founder & CEO of CyberSN and Founder of Secure Diversity, and Juliet Okafor, Founder & CEO of RevolutionCyber about their experiences founding their own companies in the cybersecurity industry.

Watch Session
Technical Briefings

Tearing Down (Sonic)Walls: Reverse-Engineering SonicOSX Firmware Encryption

Tearing Down (Sonic)Walls: Reverse-Engineering SonicOSX Firmware Encryption

Researchers walk through cracking SonicOSX: extracting keys, decrypting firmware, and analyzing its architecture at DistrictCon 2025.

Read Briefing
Datasheets

Managed Penetration Testing Service Datasheet

Managed Penetration Testing Service Datasheet

Learn how to minimize the complexity and maximize the effectiveness of large security testing initiatives with our comprehensive program management.

Download Datasheet
Technical Briefings

Tomcat CVE-2025-24813: What You Need to Know

Tomcat CVE-2025-24813: What You Need to Know

A breakdown of CVE-2025-24813 in Apache Tomcat—what it is, who’s actually at risk, and why most users likely aren’t affected. Keep calm and patch your servers.

Read Briefing
Virtual Sessions

Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security

Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security

Watch Alethe Denis, Senior Security Consultant, for an engaging deep dive into the world of Red Teaming. Through real-life stories and expert analysis, this webcast will explore the triumphs, missteps, and critical takeaways from Red Team engagements.

Watch Session
Datasheets

Cosmos Integration for Jira Datasheet

Cosmos Integration for Jira Datasheet
Learn how to effortlessly sync validated exposures from the Cosmos portal into your Jira environment to streamline vulnerability management and remediate dangerous exposures before attackers can exploit them.
Download Datasheet
Virtual Sessions

Red Teaming: Is Your Security Program Ready for the Ultimate Test?

Red Teaming: Is Your Security Program Ready for the Ultimate Test?

In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.

Watch Session
Technical Briefings

SonicWall-CVE2024-53704: Exploit Details

SonicWall-CVE2024-53704: Exploit Details

Watch a quick explainer of Bishop Fox's successful exploit of SonicWall CVE-2024-53704.

Read Briefing
Workshops & Training

Patch Perfect: Harmonizing with LLMs to Find Security Vulns

Patch Perfect: Harmonizing with LLMs to Find Security Vulns

This talk led by Bishop Fox researchers Caleb Gross & Josh Shomo cuts through the hype and offers a practical perspective that’s grounded in real-world analysis of critical bugs in widely used products.

Watch Workshop
Solution Briefs

Cosmos Explained: The People and the Platform Empowering Security Teams

Cosmos Explained: The People and the Platform Empowering Security Teams

See how Cosmos combines attack surface technology and expert testing in a fully managed service to strengthen your security posture while reducing the burden on your teams.

Read Briefing
Technical Briefings

Technical Brief on PAN-OS Vulnerability & SonicWall SWI Firmware Decryption

Technical Brief on PAN-OS Vulnerability & SonicWall SWI Firmware Decryption

Exclusive Bishop Fox client briefing: Insights into PAN-OS vulnerability (CVE-2024-0012) with Q&A and advanced threat detection strategies.

Read Briefing
Datasheets

Adversarial Controls Testing Datasheet

Adversarial Controls Testing Datasheet

Learn how Adversarial Controls Testing uses an attack-based approach mapped to the MITRE ATT&CK framework to determine the effectiveness of your email/phishing, endpoint, and network security controls.

Download Datasheet
Datasheets

Physical Penetration Testing Datasheet

Physical Penetration Testing Datasheet

Learn how our customized Red Team assessments identify security gaps in your physical, process, and human controls so you can fortify your defenses.

Download Datasheet
Virtual Sessions

Achieving DORA Threat-Led Penetration Testing Requirements

Achieving DORA Threat-Led Penetration Testing Requirements

Gain in-depth view into DORA’s threat-led penetration testing framework with practical guidance on how to integrate offensive security services.

Watch Session
Datasheets

Cosmos for ServiceNow Datasheet

Cosmos for ServiceNow Datasheet
Learn how to effortlessly sync validated exposures from the Cosmos portal into your ServiceNow environment to streamline vulnerability management and remediate dangerous exposures before attackers can exploit them.
Download Datasheet
Solution Briefs

Cosmos Integration with Jira Demo

Cosmos Integration with Jira Demo

Watch this video to see how you can streamline vulnerability management — from identification to remediation — with Cosmos integration for Jira®.

Read Briefing
Solution Briefs

Cosmos Integration with ServiceNow® Demo

Cosmos Integration with ServiceNow® Demo

Watch this video to see how you can streamline vulnerability management — from identification to remediation — with Cosmos integration for ServiceNow.

Read Briefing
Guides

FAQ Guide: Acquiring DORA Threat-Led Penetration Testing

FAQ Guide: Acquiring DORA Threat-Led Penetration Testing

Bishop Fox’s comprehensive DORA FAQ guide walks you through everything you need to know about fulfilling these critical requirements. This resource is a must-have for financial institutions looking to stay ahead of DORA’s complex compliance landscape.

Read Guide
Virtual Sessions

Red vs Blue: Building a Well-Rounded Cybersecurity Career Path

Red vs Blue: Building a Well-Rounded Cybersecurity Career Path

Hear from Héctor Cuevas Cruz as he shares his career from early days in DragonJAR forum to how he's become a team leader of hackers for Bishop Fox.

Watch Session
Virtual Sessions

Cyber Mirage: How AI is Shaping the Future of Social Engineering

Cyber Mirage: How AI is Shaping the Future of Social Engineering

In this webcast, Senior Security Consultant Brandon Kovacs aims to illuminate the sophisticated capabilities that AI brings to the table in creating hyper-realistic deepfakes and voice clones.

Watch Session
Methodologies

Bishop Fox Application Penetration Testing Packages Methodology

Bishop Fox Application Penetration Testing Packages Methodology

Download Bishop Fox's app pen testing packages methodology. Learn our Baseline, Standard, and Advanced approaches to scaling security testing coverage.

Read Methodology
Methodologies

Bishop Fox Adversarial Controls Testing Methodology

Bishop Fox Adversarial Controls Testing Methodology

Get detailed insights into how Bishop Fox conducts Adversarial Controls Testing (ACT) engagements. This comprehensive methodology document outlines the step-by-step process, collaboration model, example test cases, and delineation of responsibilities critical to validating your security controls.

Read Methodology
Virtual Sessions

Bishop Fox Livestream at DEF CON 32

Bishop Fox Livestream at DEF CON 32

Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.

Watch Session

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.