AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Alethe Denis

Bishop Fox Live at DEF CON 30 featuring Alethe Denis

Listen to social engineering expert Alethe Denis share her stories and insight with our DEF CON livestream hosts Tom Eston and Joe Sechman.

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Juneau

Bishop Fox Live at DEF CON 30 featuring Juneau

As part of our inaugural DEF CON livestream in 2022, our hosts Tom Eston and Joe Sechman spoke to infosec community member Juneau about her professional journey and the topics she's most passionate about.

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Tanya Janca

Bishop Fox Live at DEF CON 30 featuring Tanya Janca

In this session from our DEF CON livestream, Tanya Janca (AKA SheHacksPurple) talks about her books, her security journey, SAST/DAST, and more!

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Barrett Darnell

Bishop Fox Live at DEF CON 30 featuring Barrett Darnell

In this session from the Bishop Fox DEF CON 30 livestream, Principal Security Engineer at Intuit & former Fox Barrett Darnell stops by to chat with hosts Tom Eston and Joe Sechman.

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Yael Basurto Esquivel

Bishop Fox Live at DEF CON 30 featuring Yael Basurto Esquivel

Listen to Bishop Fox Security Consultant Yael Basurto Esquivel discuss some of his latest infosec research during this DEF CON 30 interview!

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Steve Ragan

Bishop Fox Live at DEF CON 30 featuring Steve Ragan

Check out this DEF CON 30 livestream snippet with security storyteller and editor at Cisco Steve Ragan!

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring DFIR Matt Scheuer

Bishop Fox Live at DEF CON 30 featuring DFIR Matt Scheuer

Tune in to this snippet from the Bishop Fox DEF CON livestream 30 where Tom Eston and Joe Sechman interview DFIR Matt Scheuer, host of the ThreatReel podcast.

Watch Session
Guides

Breaking & Entering: A Pocket Guide for Friendly Remote Admins

Breaking & Entering: A Pocket Guide for Friendly Remote Admins

This user-friendly guide offers a comprehensive offensive security roadmap for sysadmins, penetration testers, and other security professionals.

Read Guide
Resource

What the Vuln: EDR Bypass with LoLBins

What the Vuln: EDR Bypass with LoLBins

Watch the second episode of our What the Vuln livestream series as we explore how to bypass endpoint detection and response (EDR) with native Windows binaries to gain advanced post-exploitation control.

Learn More
Virtual Sessions

21 Questions with Kaitlin O'Neil, Recruiting Manager

21 Questions with Kaitlin O'Neil, Recruiting Manager

When you think of cybersecurity… what do you picture? A guy in a hoodie behind a keyboard? We don’t blame you. But Kaitlin is here to show you that women in cybersecurity are on the rise and ready to even the playing field.

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Sandeep Singh

Bishop Fox Live at DEF CON 30 featuring Sandeep Singh

In this DEF CON 30 interview from the Bishop Fox livestream, ProjectDiscovery co-founder and Nuclei creator Sandeep Singh (Geekboy) shares some thoughts about the open source community, his company, and more.

Watch Session
Virtual Sessions

21 Questions with Bianca Luna-Acosta, Security Consultant II

21 Questions with Bianca Luna-Acosta, Security Consultant II

Get to know our Lady Foxes in our "21 Questions with Bishop Fox" video series. In this episode, hear from Bianca Luna-Acosta, Security Consultant II.

Watch Session
Virtual Sessions

21 Questions with Chelsea Bradley, Contracts Manager

21 Questions with Chelsea Bradley, Contracts Manager

Get to know our Lady Foxes in our "21 Questions with Bishop Fox" video series. In this episode, hear from Chelsea Bradley, Contracts Manager.

Watch Session
Workshops & Training

Unredacter Challenge: John L.'s Solution

Unredacter Challenge: John L.'s Solution

Challenge Accepted! We asked the security community to take Unredacter to the next level by decoding our secret blurred message. Watch as John L. showcases his solution.

Watch Workshop
Workshops & Training

Unredacter Challenge: Shawn A.'s Solution

Unredacter Challenge: Shawn A.'s Solution

Challenge Accepted! We asked the security community to take Unredacter to the next level by decoding our secret blurred message. Watch as Shawn A. showcases his solution.

Watch Workshop
Workshops & Training

Unredacter Challenge: Alejandro's Solution

Unredacter Challenge: Alejandro's Solution

Challenge Accepted! We asked the security community to take Unredacter to the next level by decoding our secret blurred message. Watch as Alejandro showcases his solution.

Watch Workshop
Virtual Sessions

TomNomNom AMA

TomNomNom AMA

Tom Hudson (aka TomNomNom) participates in this Discord AMA about the pen testing tools he's created over the years, his cybersecurity journey, and more.

Watch Session
Workshops & Training

Managing Application Security Risk with Threat Modeling

Managing Application Security Risk with Threat Modeling
Watch Workshop
Virtual Sessions

Fireside Chat: What We Learned from the SolarWinds Attack (and Beyond)

Fireside Chat: What We Learned from the SolarWinds Attack (and Beyond)

On-demand webcast features security experts discussing recent attacks at SolarWinds, Colonial Pipeline, and more.

Watch Session
Customer Stories

Equifax Employs Bishop Fox’s Cosmos for Continuous Security Testing

Equifax Employs Bishop Fox’s Cosmos for Continuous Security Testing

Global data leader Equifax runs year-round perimeter testing to safeguard high-value data and stay ahead of emerging threats.

Read Story
Guides

Eyeballer: Automating Security Triage with Machine Learning

Eyeballer: Automating Security Triage with Machine Learning

This easy-to-follow guide explores the capabilities of Eyeballer, a first-of-its-kind AI-powered pen testing tool.

Read Guide
Guides

Using Cyber Offensive Methods to Improve Defense

Using Cyber Offensive Methods to Improve Defense

TAG Cyber provides an unbiased assessment of Bishop Fox’s offensive cybersecurity services and Cosmos platform.

Read Guide
Customer Stories

Zoom Secures their Rapidly Expanding Attack Surface with Cosmos

Zoom Secures their Rapidly Expanding Attack Surface with Cosmos

During unprecedented growth—jumping from 10M to 300M+ daily participants—Zoom used continuous attack surface monitoring to protect its expanding platform.

Read Story
Guides

Quantifying the Impact of Micro-Segmentation Using Illumio ASP

Quantifying the Impact of Micro-Segmentation Using Illumio ASP

Bishop Fox developed the industry’s first repeatable testing methodology to quantify the efficacy of micro-segmentation using the Illumio Adaptive Security Platform (ASP).

Read Guide

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.