Featured Resource

Bishop Fox Livestream at DEF CON 32

Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.

Screenshot of video of Dan Petro interviewing John L about the Unredacter challenge
Video

Unredacter Challenge: John L.'s Solution

Challenge Accepted! We asked the security community to take Unredacter to the next level by decoding our secret blurred message. Watch as John L. showcases his solution.

Screenshot of video of Dan Petro interviewing Shawn A about the Unredacter challenge
Video

Unredacter Challenge: Shawn A.'s Solution

Challenge Accepted! We asked the security community to take Unredacter to the next level by decoding our secret blurred message. Watch as Shawn A. showcases his solution.

Video screenshot of Dan Petro interviewing Alejando about the security tool challenge
Video

Unredacter Challenge: Alejandro's Solution

Challenge Accepted! We asked the security community to take Unredacter to the next level by decoding our secret blurred message. Watch as Alejandro showcases his solution.

RedSec After Dark: Exclusive AMA with Tom Hudson aka Tom Nom Nom with headshot on dark background.
Video

TomNomNom AMA

Tom Hudson (aka TomNomNom) participates in this Discord AMA about the pen testing tools he's created over the years, his cybersecurity journey, and more.

Cover slide of presentation: What Bad could Happen? Managing Application risk with Threat Modeling

Managing Application Security Risk with Threat Modeling

Webcast on Solar Winds attack featuring cybersecurity experts Vincent Liu, Alex Stamos, and Charles Carmakal.
Webcast

Fireside Chat: What We Learned from the SolarWinds Attack (and Beyond)

On-demand webcast features security experts discussing recent attacks at SolarWinds, Colonial Pipeline, and more.

Equifax Employs Bishop Fox’s Cosmos (formerly CAST) for Continuous Security Testing. Equifax is working with Bishop Fox for continuous security testing of their external perimeter.
Customer Story

Equifax Employs Bishop Fox’s Cosmos (formerly CAST) for Continuous Security Testing

As a global data, analytics, and technology company, Equifax plays an essential role in the global economy by helping employers, employees, financial institutions, and government agencies make critical decisions with greater confidence. The company has worked with Bishop Fox for continuous security testing for their external perimeter since 2020.
Bishop Fox Eyeballer ebook cover page
Guide

Eyeballer: Automating Security Triage with Machine Learning

This easy-to-follow guide explores the capabilities of Eyeballer, a first-of-its-kind AI-powered pen testing tool.

Tag Cyber Independent Assessment of Bishop Fox offensive security platform
Report

Using Cyber Offensive Methods to Improve Defense

TAG Cyber provides an unbiased assessment of Bishop Fox’s offensive cybersecurity services and Cosmos platform.

Zoom chose Bishop Fox for continuous security testing to add to their robust security program.
Customer Story

Zoom Secures their Rapidly Expanding Attack Surface with Cosmos (formerly CAST)

As businesses and users have shifted to remote work environments, Zoom has experienced unprecedented growth in their user base – from 10M daily meeting participants in December 2019 to 300M in April 2020. To protect these new users, Zoom sought out continuous security testing to add to their robust security program.
Efficacy of Micro Segmentation Assessment by Bishop Fox
Report

Quantifying the Impact of Micro-Segmentation Using Illumio ASP

Bishop Fox developed the industry’s first repeatable testing methodology to quantify the efficacy of micro-segmentation using the Illumio Adaptive Security Platform (ASP).

20 Tips To Make the Most of Your Pen Test Guide Cover Page
Guide

20 Tips to Make the Most of Your Pen Test

Whether you’ve conducted many pen tests or are about to embark on your first, this eBook contains helpful guidance for companies at every stage of security-program maturity.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.