Bishop Fox named “Leader” in 2024 GigaOm Radar for Attack Surface Management. Read the Report ›

Featured Resource

Get the Blueprint: Insights from Ponemon Institute’s 2023 State of Offensive Security Study

Hear from experts Larry Ponemon & Tom Eston, as they reveal our findings from a joint report with the Ponemon Institute on the 'State of Offensive Security' in 2023.

Dark purple background with headshots of speakers Erez Yalon, Vandana Verma, and Joylynn Kirui, Bishop Fox logo, and title: The Art of Hacking, Hacker's Arsenal in AppSec.
Livestream

"Hacker's Arsenal in AppSec" Session - DEF CON 31

In this session, we investigate how applications are the beating heart of the digital realm, and as hackers, we know just how to make them skip a beat.

Video thumbnail featuring the three panelist headshots: Matt Johansen, Andrew Martin, and Moses Frost.
Livestream

"Exploiting the Cloud" Session - DEF CON 31

In this session, we take a deep dive into the cloud's underbelly, exploring its vulnerabilities and exploiting its weaknesses.

Dark purple background with four panelists headshots in center, the Bishop Fox logo on top, and the title: "Tha Art Of Hacking.
Livestream

"Mastering Your Tools Session" - DEF CON 31

In this session, learn from Bishop Fox experts who are at the cutting-edge of developing tools, technologies, and methodologies which they use to uncover vulnerabilities and offer guidance to some of the most elite organizations worldwide.

Video thumbnail featuring the three panelists: Barrett Darnell, Savannah Lazzara, and Wesley Thurner.
Livestream

"Red Teaming" Session - DEF CON 31

In this session, learn the secrets of stealthy infiltration, master the latest attack vectors, and discover how to communicate your findings like a true hacker.

Video thumbnail; featuring the headshot of Chris Kirsch in center, the Bishop Fox logo and the title: "The Art of Hacking".
Livestream

An Interview with Chris Kirsch, CEO & Co-Founder of runZero - DEF CON 31

In this session, hear from Chris Kirsch, CEO and co-founder of runZero.

Headshot of Tom Hudson, Senior Security Engineer at Bishop Fox, Bishop Fox logo, and the tilte: "The Art of Hacking".
Livestream

An Interview with Tom Hudson, Senior Security Engineer at Bishop Fox - DEF CON 31

In this session, we talk with Tom Hudson who is a Senior Security Engineer at Bishop Fox, where he is part of the Capability Development team for Cosmos.

Dark purple background with photo of Chloe Messdaghi in the center.
Livestream

An Interview with Chloe Messdaghi, Head of Threat Research at Protect AI - DEF CON 31

In this session, hear from Chloé Messdaghi, an accomplished security executive with a proven track record of advising and developing solutions.

Dark purple background with headshot of John Hammond in the center.
Livestream

An Interview with John Hammond, Security Researcher at Huntress - DEF CON 31

In this session, hear from John Hammond who is a cybersecurity researcher, educator and content creator.

Phillip Wylie
Livestream

An Interview with Phillip Wylie, Podcast Host of Phillip Wylie Show - DEF CON 31

In this session, hear from Phillip Wylie, a cybersecurity expert with over 25 years of experience in IT and cybersecurity.

Black background with purple neon, turquoise, and white letters. Photo of speaker, Tom Hudson.
Livestream

Tool Talk: jsluice

Tune in to the eleventh episode of our Tool Talk series to hear Tom Hudson speak about jsluice, an open-source, Go package and command-line tool used to extract information from JavaScript files and code.

The Art of Hacking neon logo on dark background.
Livestream

The Art of Hacking: Livestream from DEF CON 31

Join us Friday, August 11, 2023 for a livestream from DEF CON 31 to hear seasoned hackers and cybersecurity experts uncover the intricacies of ethical hacking and how the hacker spirit can be harnessed to push the boundaries of technology.

Preview of Bishop Fox new offensive security guide on Cloud Penetration Testing titled: Outpacing adversaries in the cloud
Guide

Outpacing Adversaries in the Cloud: An Offensive Security Guide

Download our guide to discover the current challenges in securing the cloud, the approach offensive security takes through cloud penetration testing, and the differences and advantages of investing in CPTs as part of a cloud security program.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.