New from Ponemon Institute: The State of Offensive Security in 2023. Read the Report ›
IDC Spotlight - Continuous Prevention: How Attack Surface Management Reduces Risk
Get new analyst insights on the benefits of continuous testing.
Notes from the Dark Side: What Our Data Reveals About the Attack Surface
Join our offensive security experts as they share insights gleaned from analyzing twelve months of findings captured in Cosmos, our award-winning attack surface management platform.
Tool Talk: Burp Suite Extensions
Learn how to power up web application security testing with tips on creating customized extensions featuring BurpCage, an extension that replaces any image proxied through Burp Suite leveraging the Montoya API.
Bishop Fox Tabletop Exercise Methodology
Download our methodology to see how we approach Incident Response Tabletop Exercise engagements.
Bishop Fox Social Engineering Methodology
Download our methodology to see how we approach social engineering engagements.
Cybersecurity Style Guide v2.0
Designed for security researchers, this guide is an invaluable resource for advice on which cybersecurity terms to use in reports and how to use them correctly.
2023 GigaOm Radar for Attack Surface Management
This report is one of a series of documents that helps IT organizations assess competing Attack Surface Management solutions in the context of well-defined features and criteria.
2023 GigaOm Radar Webcast: Attack Surface Management
Join us to learn how to choose the right ASM solution for your needs and how new ASM solutions can help you improve your overall security posture.
Threat Modeling Datasheet
|Learn how threat modeling proactively addresses security issues across the software development life cycle with in-depth analysis of application design, threats, and countermeasures that become foundational to ongoing DevOps processes.|
Social Engineering Datasheet
|Learn how social engineering goes beyond conventional phishing exercises to explore the depths of how adversaries can exploit your users, empowering you with insights to improve your security awareness program and related controls like email and file security.|
Secure Code Review Datasheet
|Learn how secure code review combines cutting-edge automation with meticulous manual review, ensuring the full spectrum of code-base vulnerabilities are proactively eliminated before attackers have a fighting chance.|
Ransomware Readiness Datasheet
|Learn how to obtain a thorough assessment of your organization’s resilience to ransomware threats by applying the latest intelligence, attacker TTPs, and world-class experience so you can effectively communicate relevant risks to your leadership and refine your strategy.|