Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
Bishop Fox Application Penetration Testing Packages Methodology
Bishop Fox Livestream at DEF CON 32
Smart Grills Get Smarter: Improving IoT Security One Device at a Time
Come WiFind Me: WiFi & Other RF Surveillance
Navigating the IAM Maze: Expert Strategies for Cloud Identity Security
Speaking Board Language: Translating Cybersecurity for Executive Leadership
Intelligence That Matters: Building Cyber Threat Programs That Drive Business Value
Beyond Whack-a-Mole: Modern AppSec Strategies for High-Growth Companies
The Human Element: Building Trust and Influence in Security Leadership
Beyond Technical Exploits: The Strategic Value of Red Team Engagements
Managing SaaS Sprawl: Building Security Into Your Multi-Vendor Ecosystem
The Human Side of Security Leadership: Building Teams That Thrive
AI's Dark Potential: Robert Hansen, RSnake and Author of AI's Best Friend, Warns of Superintelligence Risks
Testing LLM Algorithms While AI Tests Us
Behind closed (but vulnerable) doors: How do we get research like Unsaflok?
Bishop Fox RSAC 2024 Livestream
Cyber Resilience: Tactics for Post-Attack Recovery
Mitigate Third-Party Risks by Strengthening Security Foundations
Women in Cybersecurity: Breaking Codes, Breaking Barriers
Pathways in Security: 21 Questions with Attack Surface Analyst Sarah Muriel
Women in Cybersecurity: 21 Questions with Security Consultant Lindsay Von Tish
Beyond Checkbox Compliance: Maximizing Security Value from PCI DSS Penetration Testing
The Zero-Day Arms Race: Why Asset Management Trumps Vulnerability Whack-a-Mole
Exploiting Java Deserialization in GWT: From Detection to Command Execution
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.