AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Virtual Sessions

Cloud Security Podcast: Cloud Pen Test of AWS with Open Source

Cloud Security Podcast: Cloud Pen Test of AWS with Open Source

Hear from Bishop Fox's Seth Art in Episode 161 of Cloud Security Podcast as he shares his extensive experience with cloud penetration testing.

Watch Session
Virtual Sessions

News Insights: 23AndMe with Alethe Denis, Security Expert - Red Team

News Insights: 23AndMe with Alethe Denis, Security Expert - Red Team

Alethe Denis, a Bishop Fox Senior Red Team consultant and Social Engineering expert, reveals her quick-take perspective on what she sees as different about the 23AndMe breach, and how it’s viewed by someone who is a career social engineer.

Watch Session
Datasheets

Red Team Datasheet

Red Team Datasheet

Learn how our engagements align to your targeted outcomes, purpose-built to emulate specific attack types, worrisome adversary groups, and emerging tactics that present the greatest risk to your environment.

Download Datasheet
Virtual Sessions

A Practical Guide to Operationalizing the FDA's 2023 Cybersecurity Requirements

A Practical Guide to Operationalizing the FDA's 2023 Cybersecurity Requirements

Join our webcast with Matt Twells to understand the impact of the FDA's HR.2617 legislation on medical device cybersecurity, learn how to build a robust plan, address vulnerabilities, manage supply chain risks, and anticipate future trends.

Watch Session
Virtual Sessions

Cloud Security Podcast: Network Pentest 2.0 - The Cloud Pentest Revolution

Cloud Security Podcast: Network Pentest 2.0 - The Cloud Pentest Revolution

Cloud configuration review is not a cloud security pen test! Seth Art clarifies the myth on this episode of Cloud Security Podcast.

Watch Session
Virtual Sessions

Purple Teaming for Security Success: Enhancing ROI and Facilitating Growth

Purple Teaming for Security Success: Enhancing ROI and Facilitating Growth

In this webcast, uncover how purple teaming initiatives can transform cybersecurity from a perceived cost center to a revenue-protecting asset. Ryan Basden, Red Team security consultant, will guide you through establishing security baselines, validating investments, and formulating a roadmap for organizational growth.

Watch Session
Virtual Sessions

Pentest Tools Podcast: We Think We Know How to Explain the Value of a Penetration Test

Pentest Tools Podcast: We Think We Know How to Explain the Value of a Penetration Test

Hear from Bishop Fox's Alethe Denis in the first episode of Pentest Tool's 'We Think We Know' podcast to unravel the intricacies of security testing.

Watch Session
Workshops & Training

Swagger Jacker: Improved Auditing of OpenAPI Definition Files

Swagger Jacker: Improved Auditing of OpenAPI Definition Files

Discover the power of Swagger Jacker, an open-source audit tool designed to improve inspection of unintentionally exposed OpenAPI definition files for penetration testers.

Watch Workshop
Workshops & Training

Ace the OSEP Exam with Sliver Framework

Ace the OSEP Exam with Sliver Framework

Unlock the secrets of passing the OSEP exam with our senior security expert, Jon Guild. Join us as Jon shares his invaluable tips and tricks for conquering this benchmark exam designed for penetration testers.

Watch Workshop
Virtual Sessions

Pragmatic AI & LLM Security Mitigations for Enterprises

Pragmatic AI & LLM Security Mitigations for Enterprises

Immerse yourself in the vibrant world of AI and Language Learning Models (LLMs) in our webinar presented in collaboration with industry leaders from Moveworks.

Watch Session
Virtual Sessions

OWASP ASVS: Unlocking Stronger Application Security

OWASP ASVS: Unlocking Stronger Application Security

Join offensive security expert Shanni Prutchi in this livestream as she shares her analysis of the 278 verification requirements listed in OWASP's Application Security Verification Standard (ASVS). Learn how to generate test cases and gain insights to effectively test your applications against the standard.

Watch Session
Virtual Sessions

Strengthening Incident Response: Combining Tabletop Exercises with Red Team Engagements

Strengthening Incident Response: Combining Tabletop Exercises with Red Team Engagements

Learn how integrating tabletop exercises with red team assessments creates a more comprehensive evaluation of your organization's incident response capabilities. Security expert Shanni Prutchi shares practical approaches for testing both your technical controls and response processes against realistic attack scenarios.

Watch Session
Reports

Cosmos: Protecting the Perimeter

Cosmos: Protecting the Perimeter

To understand the vulnerability landscape that organizations are up against, we meticulously examined 17,000 data points, extracted from over 110 billion automations, within a 12-month period. Download the report to view a comprehensive propensity model that allows security and organizational leadership to visualize the potential impact of leaving vulnerable exposures to chance.

Read Report
Guides

The Offensive Security Blueprint for Financial Services

The Offensive Security Blueprint for Financial Services

Bishop Fox's Financial Services industry cut provides a comprehensive analysis of offensive security trends within financial services, using industry data gathered from our joint research report with the Ponemon Institute.

Read Guide
Virtual Sessions

AppSec Arsenal: Modern Exploitation Techniques & Advanced Defense Strategies

AppSec Arsenal: Modern Exploitation Techniques & Advanced Defense Strategies

In this session, we investigate how applications are the beating heart of the digital realm, and as hackers, we know just how to make them skip a beat.

Watch Session
Virtual Sessions

Cloud Attack Vectors: Expert Techniques for Finding Critical Vulnerabilities

Cloud Attack Vectors: Expert Techniques for Finding Critical Vulnerabilities

In this session, we take a deep dive into the cloud's underbelly, exploring its vulnerabilities and exploiting its weaknesses.

Watch Session
Virtual Sessions

Offensive Security Arsenal: Building and Mastering Custom Security Tools

Offensive Security Arsenal: Building and Mastering Custom Security Tools

In this session, learn from Bishop Fox experts who are at the cutting-edge of developing tools, technologies, and methodologies which they use to uncover vulnerabilities and offer guidance to some of the most elite organizations worldwide.

Watch Session
Virtual Sessions

Red Team Reality: Advanced Strategies for Modern Attack Simulation

Red Team Reality: Advanced Strategies for Modern Attack Simulation

In this session, learn the secrets of stealthy infiltration, master the latest attack vectors, and discover how to communicate your findings like a true hacker.

Watch Session
Virtual Sessions

The Art of Human Hacking: Social Engineering Success Stories

The Art of Human Hacking: Social Engineering Success Stories

In this session, hear from Chris Kirsch, CEO and co-founder of runZero.

Watch Session
Virtual Sessions

Building Better Security Tools: Inside the Mind of an Open-Source Innovator

Building Better Security Tools: Inside the Mind of an Open-Source Innovator

In this session, we talk with Tom Hudson who is a Senior Security Engineer at Bishop Fox, where he is part of the Capability Development team for Cosmos.

Watch Session
Virtual Sessions

The Human Side of Security: Creating Impact Through Leadership & Advocacy

The Human Side of Security: Creating Impact Through Leadership & Advocacy

In this session, hear from Chloé Messdaghi, an accomplished security executive with a proven track record of advising and developing solutions.

Watch Session
Virtual Sessions

Malware Analysis Mastery: A Conversation with John Hammond

Malware Analysis Mastery: A Conversation with John Hammond

In this session, hear from John Hammond who is a cybersecurity researcher, educator and content creator.

Watch Session
Virtual Sessions

The Pentester's Journey: Expert Insights from a Security Veteran

The Pentester's Journey: Expert Insights from a Security Veteran

In this session, hear from Phillip Wylie, a cybersecurity expert with over 25 years of experience in IT and cybersecurity.

Watch Session
Virtual Sessions

JavaScript Vulnerability Mining: Mastering jsluice for Advanced Web App Testing

JavaScript Vulnerability Mining: Mastering jsluice for Advanced Web App Testing

Tune in to the eleventh episode of our Tool Talk series to hear Tom Hudson speak about jsluice, an open-source, Go package and command-line tool used to extract information from JavaScript files and code.

Watch Session

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.