Executive brief on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing. Watch Now

Featured Resource

Red Teaming: Is Your Security Program Ready for the Ultimate Test?

In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.

Dark purple background with headshot of John Hammond in the center.

An Interview with John Hammond, Security Researcher at Huntress - DEF CON 31

In this session, hear from John Hammond who is a cybersecurity researcher, educator and content creator.

Phillip Wylie

An Interview with Phillip Wylie, Podcast Host of Phillip Wylie Show - DEF CON 31

In this session, hear from Phillip Wylie, a cybersecurity expert with over 25 years of experience in IT and cybersecurity.

Black background with purple neon, turquoise, and white letters. Photo of speaker, Tom Hudson.

Tool Talk: jsluice

Tune in to the eleventh episode of our Tool Talk series to hear Tom Hudson speak about jsluice, an open-source, Go package and command-line tool used to extract information from JavaScript files and code.

The Art of Hacking neon logo on dark background.

The Art of Hacking: Livestream from DEF CON 31

Join us Friday, August 11, 2023 for a livestream from DEF CON 31 to hear seasoned hackers and cybersecurity experts uncover the intricacies of ethical hacking and how the hacker spirit can be harnessed to push the boundaries of technology.

Preview of Bishop Fox new offensive security guide on Cloud Penetration Testing titled: Outpacing adversaries in the cloud
Guides & Report

Outpacing Adversaries in the Cloud: An Offensive Security Guide

Download our guide to discover the current challenges in securing the cloud, the approach offensive security takes through cloud penetration testing, and the differences and advantages of investing in CPTs as part of a cloud security program.

Ponemon Institute logo with teal title for new report: The State of Offensive Security 2023, creating a Blueprint for Success.
Guides & Report

Ponemon Institute Report 2023

In a new study conducted with Bishop Fox, the Ponemon Institute surveyed nearly 700 security and IT practitioners who actively employ offensive security practices. The analysis explores where enterprises are focusing offensive security efforts and the drivers behind them.

What the Vuln neon logo with the subtitle: Technical Series Quartely Roundup subtitle and featuring a fox in a hoody pointing to the logo..

What the Vuln Series: Quarterly Roundup

Watch the third episode of our What the Vuln technical series as we share the most intriguing vulnerabilities that we encountered in Q2 2023 and how we hacked them.

Get the Blueprint Ponemon Institute webcast with headshots of Larry Ponemon and Tom Eston.
Virtual Session

Get the Blueprint: Insights from Ponemon Institute’s 2023 State of Offensive Security Study

Hear from experts Larry Ponemon & Tom Eston, as they reveal our findings from a joint report with the Ponemon Institute on the 'State of Offensive Security' in 2023.

Preview of Bishop Fox Red teaming Guide cover page on dark purple background.
Guides & Report

Getting Red Teaming Right: A How-to Guide

Read our eBook to learn how Red Teaming can provide the ultimate training ground for your defenses, assessing how well (or not) intrusions are detected and how an attacker can move throughout your network to achieve exfiltration.

Panelist headshots for fireside chat  How the National Cybersecurity Strategy Will Shape the Future of Offensive Security.
Virtual Session

How the New National Cybersecurity Strategy Will Shape the Future of Offensive Security

Join Bishop Fox for a fireside chat with renowned cybersecurity experts – Evan Wolff & Justin Greis. We’ll discuss how new proposed regulations will impact offensive security initiatives, both short- and long-term.

OWASP ASVS Demystified digital guide on purple lock background.
Guides & Report

OWASP ASVS Demystified: A Practical Guide to Web Application Security Testing

In this technical guide, offensive security expert Shanni Prutchi provides analysis of the entire 278 verification requirements listed in OWASP's ASVS standard to assist in the generation of test cases and provide context to companies looking to test their applications against the standard.

Preview of three pages of the IDC report on how attack surface management reduces risk on dark purple background.
Guides & Report

IDC Spotlight - Continuous Prevention: How Attack Surface Management Reduces Risk

Get new analyst insights on the benefits of continuous testing.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.