Featured Resource

Bishop Fox Livestream at DEF CON 32

Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.

Preview of the red team datasheet cover pages on dark background.
Datasheet

Red Team Datasheet

Learn how our engagements align to your targeted outcomes, purpose-built to emulate specific attack types, worrisome adversary groups, and emerging tactics that present the greatest risk to your environment.
Headshot of main speaker: Matt Twells, Senior Solutions Architect and title of webcast: Pacemakers to Pacesetters.
Webcast

A Practical Guide to Operationalizing the FDA's 2023 Cybersecurity Requirements

Join our webcast with Matt Twells to understand the impact of the FDA's HR.2617 legislation on medical device cybersecurity, learn how to build a robust plan, address vulnerabilities, manage supply chain risks, and anticipate future trends.

Image from YouTube of Cloud Security Podcast epiode 188
Video

Cloud Security Podcast: Network Pentest 2.0 - The Cloud Pentest Revolution

Cloud configuration review is not a cloud security pen test! Seth Art clarifies the myth on this episode of Cloud Security Podcast.

Webcast title: Purple Teaming for Security Success with headshot of speaker, Ryan Basden.
Webcast

Purple Teaming for Security Success: Enhancing ROI and Facilitating Growth

In this webcast, uncover how purple teaming initiatives can transform cybersecurity from a perceived cost center to a revenue-protecting asset. Ryan Basden, Red Team security consultant, will guide you through establishing security baselines, validating investments, and formulating a roadmap for organizational growth.

Video clip from Pentest Tools Episode featuring Bishop Fox's Alethe Denis.
Video

Pentest Tools Podcast: We Think We Know How to Explain the Value of a Penetration Test

Hear from Bishop Fox's Alethe Denis in the first episode of Pentest Tool's 'We Think We Know' podcast to unravel the intricacies of security testing.

Training session title: Swagger Jacker Training about improved auditing of OpenAPI Definition Files with the headshot os security consultant Tony West, a Bishop Fox adversarial operator.
Livestream

Swagger Jacker: Improved Auditing of OpenAPI Definition Files

Discover the power of Swagger Jacker, an open-source audit tool designed to improve inspection of unintentionally exposed OpenAPI definition files for penetration testers.

Video thumbnail featuring the speaker headshot, Jon Guild, and the title of the webcast: How to Ace the OSEP exam with the Sliver Framework.
Livestream

Ace the OSEP Exam with Sliver Framework

Unlock the secrets of passing the OSEP exam with our senior security expert, Jon Guild. Join us as Jon shares his invaluable tips and tricks for conquering this benchmark exam designed for penetration testers.

Video thumbnail featuring the three panelists headshots and the title of the fireside chat on dark brackground.
Webcast

Pragmatic AI & LLM Security Mitigations for Enterprises

Immerse yourself in the vibrant world of AI and Language Learning Models (LLMs) in our webinar presented in collaboration with industry leaders from Moveworks.

Purple gradient background with headshot of speaker on left side.
Livestream

OWASP ASVS: Unlocking Stronger Application Security

Join offensive security expert Shanni Prutchi in this livestream as she shares her analysis of the 278 verification requirements listed in OWASP's Application Security Verification Standard (ASVS). Learn how to generate test cases and gain insights to effectively test your applications against the standard.

Bridging the Gap Integrating Tabletop Exercises and Red Teaming for Seamless Incident Response with purple background and Bishop Fox logo.
Video

Bridging the Gap: Integrating Tabletop Exercises and Red Teaming for Seamless Incident Response

Hear from Shanni Prutchi, Security Consultant III, to learn about enhancing your organization's incident response capabilities through combined red teaming and tabletop exercises. Explore attack detection, response, and the importance of established processes.

Preview of the cover page of the Cosmos report on Data Analysis unveiling critical vulnerabilities in attack surfaces.
Report

Cosmos: Protecting the Perimeter

To understand the vulnerability landscape that organizations are up against, we meticulously examined 17,000 data points, extracted from over 110 billion automations, within a 12-month period. Download the report to view a comprehensive propensity model that allows security and organizational leadership to visualize the potential impact of leaving vulnerable exposures to chance.

Webcast title with speakers' headshot: Combatting Adversaries: Proactive Social Engineering & Network Testing.
Webcast

Combatting Adversaries: Proactive Social Engineering & Network Testing

Join us for a fireside chat that illuminates the importance of proactive social engineering defense and the key role of internal network testing in orchestrating a successful counteroffensive against cyberattacks.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.