Featured Resource

Bishop Fox Livestream at DEF CON 32

Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.

CyberRisk Alliance Survey Report cover page and preview of internal page with graph. The cover title is "As Cloud Adoption Surges, Can Security Keep Pace?"
Report

CyberRisk Alliance Cloud Adoption Security Report

Explore key findings and insights from the CRA Business Intelligence Cloud Security Survey of more than 300 security leaders & practitioners.

GigaOm Special Webcast on Attack Surface Management solution featuring analyst Chris Ray with headshot
Webcast

2022 GigaOm Analyst Webcast: Everything You Need to Know About Attack Surface Management

Tune into our webcast to learn more about Attack Surface Management and tips for evaluating solutions. GigaOm analyst Chris Ray joins us to share his insights!

Tool Talk Episode 6: Debugging Ruby Exploits
Webcast

Tool Talks: Debugging Ruby Exploits

In our sixth edition of the Tool Talk series, we explore a new test harness for discovering and crafting Ruby exploits.

Tool Talk Episode 5: ripgen for finding subdomain permutations

Tool Talk: ripgen

In our fifth edition of the Tool Talk series, we explore ripgen, a subdomain discovery tool designed to significantly increase permutation combinations.

Webcast title in Futuristic Neon lettering: Achieving Warp Speed to Continuous Testing: How to Calculate ROI for your Business.
Webcast

Achieving Warp Speed to Continuous Testing: How to Calculate ROI for your Business

Uncover your organization’s unique cost savings and risk mitigation strategy for a continuous offensive testing solution with our customized ROI calculation.

Bishop Fox combats ransomware with an offensive Security Roadmap represented by a compass.
Webcast

Combating Ransomware with an Offensive Roadmap

Examine your organization’s level of ransomware preparedness through the lens of offensive security considerations.

Preview of Bishop Fox Secure Code Review Methodology cover page on dark purple background.
Methodology

Bishop Fox Secure Code Review Methodology

Overview of Bishop Fox’s methodology for Secure Code Review.

SC Media Continuously Hacking Yourself on-demand webcast about attack surface management and continuous pen testing
Webcast

SC Media Special Event: Continuously Hacking Yourself

Explore the benefits of continually hacking yourself to discover new assets (including many you don’t even know you have) and their associated vulnerabilities.

Top 50 Questions to Ask When Evaluating Offensive Security Providers check list first page preview
Guide

Evaluating Offensive Security Solutions: Top 50 Questions to Ask

To ensure your security investments offer complete visibility into your attack surface and uncover critical risks at scale, we've compiled questions to help you evaluate solutions. We focus on six key areas: attack surface discovery, exposure identification, triage, validation, remediation, and outputs.

Security Weekly Labs Product Reviews: SW Labs Attack Surface Management Category Overview, sponsored by Bishop Fox; preview of the cover page and two internal pages.
Report

SW Labs Category Overview: Attack Surface Management (ASM) Solutions

Comprehensive overview of the fast-growing Attack Surface Management category from the cybersecurity experts at Security Weekly Labs.

Security Weekly Labs Product Reviews: SW Labs Attack Surface Management Category Overview, sponsored by Bishop Fox
Report

SW Labs Product Review: Cosmos Attack Surface Management Platform

SW Labs assessed Bishop Fox’s Cosmos (formerly CAST) the “Best Emerging Technology" Attack Surface Management Platform of 2021.

ebook cover: "The wolf in Sheep Clothing" How low-risk exposures become catalysts for destructive attacks
Guide

The Wolf in Sheep’s Clothing

See how low-risk exposures can become catalysts for destructive attacks. We include examples of exposures found in real-world environments, including a step-by-step view into how ethical hackers exploited them to reach high-value targets.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.