Featured Resource

Bishop Fox Livestream at DEF CON 32

Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.

Video thumbnail with overlay play button featuring cybersecurity expert, Tanya Janca (AKA SheHacksPurple) headshot.
Video

Bishop Fox Live at DEF CON 30 featuring Tanya Janca

In this session from our DEF CON livestream, Tanya Janca (AKA SheHacksPurple) talks about her books, her security journey, SAST/DAST, and more!

Barrett Darnell headshot on video thumbnail with play button.
Video

Bishop Fox Live at DEF CON 30 featuring Barrett Darnell

In this session from the Bishop Fox DEF CON 30 livestream, Principal Security Engineer at Intuit & former Fox Barrett Darnell stops by to chat with hosts Tom Eston and Joe Sechman.

Yael Basurto Esquivel headshot on video thumbnail with play button.
Video

Bishop Fox Live at DEF CON 30 featuring Yael Basurto Esquivel

Listen to Bishop Fox Security Consultant Yael Basurto Esquivel discuss some of his latest infosec research during this DEF CON 30 interview!

Headshot of cybersecurity expert Steve Ragan on video thumbnail with play button.
Video

Bishop Fox Live at DEF CON 30 featuring Steve Ragan

Check out this DEF CON 30 livestream snippet with security storyteller and editor at Cisco Steve Ragan!

Barry MacLaughlin headshot on video thumbnail with overlay play button.
Video

Bishop Fox Live at DEF CON 30 featuring Barry MacLaughlin

In this closing interview from the Bishop Fox DEF CON 30 livestream, Senior Director of Recruiting Barry MacLaughlin discusses hiring, what makes a winning security culture, and more.

DFIR Matt Scheuer headshot on video thumbnail with play button.
Video

Bishop Fox Live at DEF CON 30 featuring DFIR Matt Scheuer

Tune in to this snippet from the Bishop Fox DEF CON livestream 30 where Tom Eston and Joe Sechman interview DFIR Matt Scheuer, host of the ThreatReel podcast.

Illustration of 3 documents next to each other
Guide

Breaking & Entering: A Pocket Guide for Friendly Remote Admins

This user-friendly guide offers a comprehensive offensive security roadmap for sysadmins, penetration testers, and other security professionals.

Video of 21 Questions series with Teresa Rirchardson
Video

21 Questions with Teresa Richardson, VP of Revenue Operations

When you think of cybersecurity… what do you picture? A guy in a hoodie behind a keyboard? We don’t blame you. But Teresa is here to show you that women in cybersecurity are on the rise and ready to even the playing field.

Black background with purple and teal neon letters title: What the Vuln, EDR BYPAS W. LOLBINS.
Livestream

What the Vuln: EDR Bypass with LoLBins

Watch the second episode of our What the Vuln livestream series as we explore how to bypass endpoint detection and response (EDR) with native Windows binaries to gain advanced post-exploitation control.

Video of 21 Questions series with Kaitlin O'Neil headshot on dark background.
Video

21 Questions with Kaitlin O'Neil, Recruiting Manager

When you think of cybersecurity… what do you picture? A guy in a hoodie behind a keyboard? We don’t blame you. But Kaitlin is here to show you that women in cybersecurity are on the rise and ready to even the playing field.

Video of 21 Questions series with Sarah Ferenczi
Video

21 Questions with Sarah Ferenczi, Security Consultant II

When you think of cybersecurity… what do you picture? A guy in a hoodie behind a keyboard? We don’t blame you. But Sarah is here to show you that women in cybersecurity are on the rise and ready to even the playing field.

Video of 21 Questions series with Allison Arvizu
Video

21 Questions with Allison Arvizu, VP of Sales

Get to know our Lady Foxes in our "21 Questions with Bishop Fox" video series. In this episode, hear from Allison Arvizu, VP of Sales.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.