Bishop Fox named “Leader” in 2024 GigaOm Radar for Attack Surface Management. Read the Report ›

Featured Resource

Cyber Resilience: Tactics for Post-Attack Recovery

Join Christie Terrill and Tom Eston as they share practical advice on the proactive security measures you can take today and provide a space to ask our security experts your most pressing questions.


Cosmos Datasheet

Learn how Cosmos combines attack surface management with expert-driven penetration testing to help security teams identify and remediate dangerous exposures before attackers can exploit them.
Managed Security Service: Cosmos External Penetration Testing (CEPT) datasheet pages thumbnail floating on dark background..

Cosmos External Penetration Testing (CEPT) Datasheet

Learn how Cosmos External Penetration Testing (CEPT) expands the scope of Cosmos Attack Surface Management to deliver the highest level of attack surface protection and meet compliance requirements.

Managed Service Cosmos Attack Surface Management datasheet cover pages floating on dark background.

Cosmos Attack Surface Management (CASM) Datasheet

Learn how this innovative managed service combines advanced attack surface technology with expert-driven testing to help you quickly close the window of vulnerability and strengthen resilience against ever-changing threats.
Managed Security Service: Cosmos Application Penetration Testing (CAPT) datasheet pages floating on dark background.

Cosmos Application Penetration Testing (CAPT) Datasheet

Learn how to strengthen the security of your critical business applications with authenticated assessments that uncover the full spectrum of exposures above and below the surface.
2024 Q2 CAPT Methodology Digital Tile

Cosmos Application Penetration Testing Methodology

This methodology document provides an overview of Bishop Fox's Cosmos Application Penetration Testing engagements.

Cloud Security Podcast Interview3

Cloud Security Podcast: CloudFoxable Demo

Watch the CloudFoxable demo to see a gamified cloud hacking sandbox where users can find latent attack paths in an intentionally vulnerable AWS environment.

Bishop Fox Video Matt Twells CISO Special.

The "New CISO" Special: Organizing the Chaos

With Senior Solutions Architect Matt Twells, Bishop Fox offers a comprehensive guide to ease into your role confidently, providing a strategic framework to streamline your initial efforts.

Video of Alethe Denis, Security Expert - Red Team, discussing 23AndMe Hack.

News Insights: 23AndMe with Alethe Denis, Security Expert - Red Team

Alethe Denis, a Bishop Fox Senior Red Team consultant and Social Engineering expert, reveals her quick-take perspective on what she sees as different about the 23AndMe breach, and how it’s viewed by someone who is a career social engineer.

Black and yellow background with Cloud Pentest of AWS with Open Source overlay and Seth Art's headshot.

Cloud Security Podcast: Cloud Pen Test of AWS with Open Source

Hear from Bishop Fox's Seth Art in Episode 161 of Cloud Security Podcast as he shares his extensive experience with cloud penetration testing.

Preview of the red team datasheet cover pages on dark background.

Red Team Datasheet

Learn how our engagements align to your targeted outcomes, purpose-built to emulate specific attack types, worrisome adversary groups, and emerging tactics that present the greatest risk to your environment.
Headshot of main speaker: Matt Twells, Senior Solutions Architect and title of webcast: Pacemakers to Pacesetters.

A Practical Guide to Operationalizing the FDA's 2023 Cybersecurity Requirements

Join our webcast with Matt Twells to understand the impact of the FDA's HR.2617 legislation on medical device cybersecurity, learn how to build a robust plan, address vulnerabilities, manage supply chain risks, and anticipate future trends.

Image from YouTube of Cloud Security Podcast epiode 188

Cloud Security Podcast: Network Pentest 2.0 - The Cloud Pentest Revolution

Cloud configuration review is not a cloud security pen test! Seth Art clarifies the myth on this episode of Cloud Security Podcast.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.