Executive brief on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing. Watch Now

Featured Resource

Red Teaming: Is Your Security Program Ready for the Ultimate Test?

In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.

Promotional banner for virtual session titled 'Breaking AI: Inside the Art of LLM Pen Testing' featuring stylized graphics of a laptop and glitch art design elements.
Virtual Session

Breaking AI: Inside the Art of LLM Pen Testing

Learn why traditional penetration testing fails on LLMs. Join Bishop Fox’s Brian D. for a deep dive into adversarial prompt exploitation, social engineering, and real-world AI security techniques. Rethink how you test and secure today’s most powerful models.

Bold graphic with black background promoting a Sliver Framework workshop titled 'Sliver: Staging & Automation'; features white and neon yellow text, Sliver logo in a white box, and digital glitch-style accents in magenta, cyan, and yellow on the edges.
Workshops & Training

Sliver Workshop Part 2: Staging & Automation

In our second workshop, we’ll explore Sliver’s new implant staging process and demonstrate basic CLI automation features. We’ll also walk through Sliver’s supported pivot types for lateral movement, including TCP, and wrap up by exploring automation options using the SliverPy project.

bfx25_Red team solution brief ft
Solution Brief

Red Team & Adversarial Emulation Solution Brief

With a range of approaches that simulate breach scenarios at your organization, adversarial emulation is the most effective way to know if your team is prepared to detect, respond, and recover—before a real breach happens.

Virtual session titled 'Architecting Cloud Security Testing in the GenAI Era' featuring modern typography and abstract technical design elements.
Virtual Session

Architecting Cloud Security Testing in the GenAI Era

Join Steven Smiley and Jessica Stinson for a deep dive into how early-stage architectural reviews can transform the effectiveness of your testing. Whether you're navigating IAM setups or preparing to tackle GenAI risks in cloud environments, this session has the clarity and direction you need to test smarter—not just harder.

Sliver Framework Getting Started and 1.6 Features Event image with Bishop Fox branding.
Workshops & Training

Sliver Workshop Part 1: Getting Started & 1.6 Features

Watch an interactive workshop led by Bishop Fox Senior Security Consultant, Tim Ghatas, as we dive into Sliver, the open-source C2 framework making waves in Red Team ops.

Interview: PCI DSS 4.0 Offensive Security Requirements Expert Breakdown virtual session with Bishop Fox branding.
Executive Briefing

Panel: PCI DSS 4.0 Expert Breakdown

This executive brief features an expert discussion focusing on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing.

Subscribe to our blog and advisories

Be first to learn about latest tools, advisories, and findings.

Attacking & Defending Deepfakes: A Red Teamer’s Perspective featured image with Bishop Fox new branding of easter eggs.
Virtual Session

Attacking & Defending Deepfakes: A Red Teamer’s Perspective

Explore the offensive and defensive use of deepfake technology in cybersecurity with Bishop Fox red teamer Brandon Kovacs. This session dives into real-world attack simulations, red team methodologies, and practical mitigation strategies for organizations facing the rapidly growing threat of deepfakes.

Attack Surface Management Measuring Real World Impact Webcast featured image.
Virtual Session

Attack Surface Management: Measuring Real-World Impact

Our experts explain how to tell if your ASM is effective, what teams often miss, and why it’s more than just tracking known vulnerabilities.

Screenshot of "Dark Reading Panel: Promise & Peril of AI" video thumbnail.
Virtual Session

The Promise and Perils of AI: Navigating Emerging Cyber Threats - A Dark Reading Panel

This video showcases leading voices in cybersecurity explaining their examinations into how AI is simultaneously transforming cyber defense and supercharging attacker capabilities. Together, they explored how GenAI is reshaping the threat landscape and what security leaders must do to adapt.

Panel discussion on building cybersecurity companies featuring women leaders Christie Terrill of Bishop Fox, Deidre Diamond of CyberSN, and Juliet Okafor of RevolutionCyber.
Virtual Session

Building Cybersecurity Companies: Stories and Lessons from Two Women Founders

Christie Terrell, CISO at Bishop Fox, interviews Deidre Diamond, Founder & CEO of CyberSN and Founder of Secure Diversity, and Juliet Okafor, Founder & CEO of RevolutionCyber about their experiences founding their own companies in the cybersecurity industry.

District Con 2025 Decryption Firmware with Sonicrack video logo with play button.
Technical Briefing

Tearing Down (Sonic)Walls: Reverse-Engineering SonicOSX Firmware Encryption

Researchers walk through cracking SonicOSX: extracting keys, decrypting firmware, and analyzing its architecture at DistrictCon 2025.

Preview of the managed penetration testing services datasheet.
Datasheet

Managed Penetration Testing Service Datasheet

Learn how to minimize the complexity and maximize the effectiveness of large security testing initiatives with our comprehensive program management.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.