Featured Resource

Bishop Fox Livestream at DEF CON 32

Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.

Sandeep Singh featured headshot for exclusive session on the Nuclei security tool demo.
Webcast

The Mind Behind Nuclei, Demo with Sandeep Singh

Join co-founder of ProjectDiscovery, Sandeep Singh, for a demo of the new Nuclei tool.

Bishop Fox Tool Talk Episode 4 Unredacter with subtitle easily reverse redacted and pixelized text.
Webcast

Tool Talk: Unredacter

In our fourth edition of the Tool Talk series, we dive into Unredacter, a tool created by Dan Petro, Lead Researcher at Bishop Fox, that takes redacted pixelized text and reverses it back to its original text.

Preview cover page of the asminject.py technical guide highlighting the capabilities of it, a Linux code injection security tool.
Guide

asminject.py: Compromise Trusted Linux Processes and Containers

This step-by-step technical guide highlights the capabilities of asminject.py, a code injection tool used to compromise Linux processes and containers.

Headshot of Vinnie Liu, CEO at Bishop Fox interviewed by podcaster Ryan Naraine of Security Conversations
Video

Vinnie Liu: A Life in the Offensive Security Trenches

Ryan Naraine, Editor at SecurityConversations, interviews Bishop Fox's Co-Founder & CEO Vinnie Liu on the origins and evolution of the pen testing services business.

Ransomware scenario emulation report cover page and preview with ransomware readiness seal.
Report

Ransomware Scenario Emulation Report with Illumio

Illumio, Inc. engaged Bishop Fox to measure the effectiveness of Illumio Core for blue teams to detect and contain a ransomware attack. The report details the findings identified during the course of the engagement, which started on March 10, 2022.

Generic On Demand 1200x628
Video

Watch a Special Livestream From DEF CON 30

Watch the lineup of leaders & influencers from the infosec community who joined us live at DEF CON 30!

Tool Talk Episode three: Nuclei security tool with headshots of the four speakers on dark background.
Webcast

Tool Talk: Nuclei

In our third edition of the Tool Talk series, we dive into the open-source tool Nuclei, a fast and customizable vulnerability scanner based on simple YAML-based DSL.

Application Security webcast: Getting the Most of your Pen Test with Dan Petro headshot
Webcast

Application Security: Getting the Most Out of Your Penetration Tests

Learn how to make the most of your application pen test and implement steps for repetitive secure application design in the future.

CISO Stories YouTube video thumbnail image featuring Will Lin headshot.
Video

CISO Stories featuring Will Lin, Founding Team Member at ForgePoint Capital

Will Lin, founding team member at ForgePoint Capital (and investor in Bishop Fox) and co-creator of the CISO community Security Tinkerers, discusses his passion for technology and how it led him to a career helping security companies launch, as well as his work supporting CISOs through collaboration and knowledge sharing.

CyberRisk Alliance Survey Report cover page and preview of internal page with graph. The cover title is "As Cloud Adoption Surges, Can Security Keep Pace?"
Report

CyberRisk Alliance Cloud Adoption Security Report

Explore key findings and insights from the CRA Business Intelligence Cloud Security Survey of more than 300 security leaders & practitioners.

GigaOm Special Webcast on Attack Surface Management solution featuring analyst Chris Ray with headshot
Webcast

2022 GigaOm Analyst Webcast: Everything You Need to Know About Attack Surface Management

Tune into our webcast to learn more about Attack Surface Management and tips for evaluating solutions. GigaOm analyst Chris Ray joins us to share his insights!

Tool Talk Episode 6: Debugging Ruby Exploits
Webcast

Tool Talks: Debugging Ruby Exploits

In our sixth edition of the Tool Talk series, we explore a new test harness for discovering and crafting Ruby exploits.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.