New from Ponemon Institute: The State of Offensive Security in 2023. Read the Report ›

Featured Resource

Get the Blueprint: Insights from Ponemon Institute’s 2023 State of Offensive Security Study

Hear from experts Larry Ponemon & Tom Eston, as they reveal our findings from a joint report with the Ponemon Institute on the 'State of Offensive Security' in 2023.

2023 Q2 Cyber Sec Leaders Videos Tile Spotlight Avia Ben Menahem

An Interview with Avi Ben-Menahem, CISO, NYDIG - 2023 RSAC Livestream

In this session, hear from Avi Ben-Menahem who is the Chief Information Security Officer (CISO) at NYDIG, responsible for product security, security governance, incident response, security assurance (secure development, red teaming) and enterprise security.

The Art & Science of Cyber Leadership interview featuring headshot of Andy Ellis, Author of 1% Leadership.

An Interview with Andy Ellis, Author of 1% Leadership - 2023 RSAC Livestream

In this session, hear from Andy Ellis who is a seasoned technology and business executive with deep expertise in security, managing risk, and leading an inclusive culture. He is also the author of 1% Leadership, a handy guidebook that business readers can regularly apply to identify blind spots, boost morale, and solve problems at work.

Bishop Fox with female fox astronaut in Rosie Riveter pose with webcast title: Defend Like A Girl and sub title: Making your way to cyber success.

Defend Like A Girl: Hacking Your Way to Cyber Success

Join our livestream as host Alethe Denis and special guests Lindsay Von Tish, Jessica Stinson, Shanni Prutchi, and Katie Ritchie as they share their experiences as hackers and showcase how you can find success in the rapidly evolving world of cybersecurity.

The art & science of cuber leadership neon logo on dark purple background.

The Art & Science of Cyber Leadership: A Livestream from RSAC 2023

Join us for a livestream from RSA Conference to explore cybersecurity leadership through multiple lenses. Get perspectives from CISOs, industry authorities, cyber-focused investors, and security founders on topics that are top of mind for today’s security leaders.

A cover report imagery with charts and infinity ring

Shifting Left: A DevSecOps Field Guide

Our eBook offers practical recommendations on how developers and security teams alike can move towards a DevSecOps model in any organization – with a goal of shared responsibility and creating a perpetual and repeatable process.

Penetrating the Cloud title on dark purple background and security consultants, Seth Art & Nate Robb headshots.

Penetrating the Cloud: Uncovering Unknown Vulnerabilities

Seth Art, Principal Security Consultant at Bishop Fox, and Nate Robb, Senior Operator at Bishop Fox, discuss two distinct ways (zero-knowledge & assumed-breach perspectives) to proactively identify, understand, and mitigate the most impactful vulnerabilities lurking in your cloud environment.

Webcast on how to prepare for ransomware with real-world playbooks featuring the headshots of Bishop Fox security experts, Tom Eston and Trevin Edgeworth.

Ready or Not? Test Your Ransomware Defenses Against Real-World Playbooks

Join Bishop Fox experts Tom Eston, AVP of Consulting and Trevin Edgeworth, Red Team Practice Director as they breakdown why ransomware emulations are the best way to test your defenses.

Black background with purple and teal neon letters title: What the Vuln, EDR BYPAS W. LOLBINS.

What the Vuln: EDR Bypass with LoLBins

Watch the second episode of our What the Vuln livestream series as we explore how to bypass endpoint detection and response (EDR) with native Windows binaries to gain advanced post-exploitation control.

Bishop Fox Livestream Zimbra Tile

What the Vuln: Zimbra

Watch the inaugural episode of our What the Vuln livestream series as we examine Zimbra Zip Path Traversal vulnerabilities, CVE-2022-27925 and CVE-2022-37042.

Tool Talk Episode 9 webcast title in neon letters on dark background with Matt Keeley and Joe Sechman headshots presenting the security tool Spoofy.

Tool Talk: Spoofy

Watch to explore Spoofy, a domain spoofing tool that checks whether a list of domains (in bulk) can be spoofed based on SPF and DMARC records.

Webcast on how emulation techniques provide safe testing scenarios to uncover ransomware susceptibility featuring the headshots of Bishop Fox and Illumio security experts, Trevin Edgeworth and Paul Dant.

Ransomware Emulations: Pressure-Testing Scenarios for Cybersecurity Defense Teams

Join us to learn how ransomware emulation provides safe testing scenarios to uncover ransomware susceptibility in your security environment.

Bishop Fox eBook cover Looking Toward Cosmos: Business Justification for Continuous Penetration Testing.

Looking Toward the Cosmos: Making the Case for Continuous Offensive Security

Download this eBook to uncover the factors and inputs used in our customizable ROI calculator that are critical to making the business case for continuous offensive testing. The output of the calculator is intended to help you draw a direct line from investment to risk mitigation that can be communicated to both technical and non-technical decision makers.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.