AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Virtual Sessions

Hacker Evolution: From Technical Mastery to Visionary Leadership

Hacker Evolution: From Technical Mastery to Visionary Leadership

Join us Friday, August 11, 2023 for a livestream from DEF CON 31 to hear seasoned hackers and cybersecurity experts uncover the intricacies of ethical hacking and how the hacker spirit can be harnessed to push the boundaries of technology.

Watch Session
Guides

Outpacing Adversaries in the Cloud: An Offensive Security Guide

Outpacing Adversaries in the Cloud: An Offensive Security Guide

Download our guide to discover the current challenges in securing the cloud, the approach offensive security takes through cloud penetration testing, and the differences and advantages of investing in CPTs as part of a cloud security program.

Read Guide
Reports

Ponemon Institute Report 2023

Ponemon Institute Report 2023

In a new study conducted with Bishop Fox, the Ponemon Institute surveyed nearly 700 security and IT practitioners who actively employ offensive security practices. The analysis explores where enterprises are focusing offensive security efforts and the drivers behind them.

Read Report
Virtual Sessions

Breaking Down Q2's Critical CVEs: From Discovery to Exploitation

Breaking Down Q2's Critical CVEs: From Discovery to Exploitation

Watch the third episode of our What the Vuln technical series as we share the most intriguing vulnerabilities that we encountered in Q2 2023 and how we hacked them.

Watch Session
Virtual Sessions

Get the Blueprint: Insights from Ponemon Institute’s 2023 State of Offensive Security Study

Get the Blueprint: Insights from Ponemon Institute’s 2023 State of Offensive Security Study

Hear from experts Larry Ponemon & Tom Eston, as they reveal our findings from a joint report with the Ponemon Institute on the 'State of Offensive Security' in 2023.

Watch Session
Guides

Getting Red Teaming Right: A How-to Guide

Getting Red Teaming Right: A How-to Guide

Read our eBook to learn how Red Teaming can provide the ultimate training ground for your defenses, assessing how well (or not) intrusions are detected and how an attacker can move throughout your network to achieve exfiltration.

Read Guide
Virtual Sessions

How the New National Cybersecurity Strategy Will Shape the Future of Offensive Security

How the New National Cybersecurity Strategy Will Shape the Future of Offensive Security

Join Bishop Fox for a fireside chat with renowned cybersecurity experts – Evan Wolff & Justin Greis. We’ll discuss how new proposed regulations will impact offensive security initiatives, both short- and long-term.

Watch Session
Guides

OWASP ASVS Demystified: A Practical Guide to Web Application Security Testing

OWASP ASVS Demystified: A Practical Guide to Web Application Security Testing

In this technical guide, offensive security expert Shanni Prutchi provides analysis of the entire 278 verification requirements listed in OWASP's ASVS standard to assist in the generation of test cases and provide context to companies looking to test their applications against the standard.

Read Guide
Reports

IDC Spotlight - Continuous Prevention: How Attack Surface Management Reduces Risk

IDC Spotlight - Continuous Prevention: How Attack Surface Management Reduces Risk

Get new analyst insights on the benefits of continuous testing.

Read Report
Virtual Sessions

Notes from the Dark Side: What Our Data Reveals About the Attack Surface

Notes from the Dark Side: What Our Data Reveals About the Attack Surface

Join our offensive security experts as they share insights gleaned from analyzing twelve months of findings captured in Cosmos, our award-winning attack surface management platform.

Watch Session
Workshops & Training

Powering Up Burp Suite: Building Custom Extensions for Advanced Web Application Testing

Powering Up Burp Suite: Building Custom Extensions for Advanced Web Application Testing

Learn how to power up web application security testing with tips on creating customized extensions featuring BurpCage, an extension that replaces any image proxied through Burp Suite leveraging the Montoya API.

Watch Workshop
Methodologies

Bishop Fox Tabletop Exercise Methodology

Bishop Fox Tabletop Exercise Methodology

Download Bishop Fox's IR tabletop exercise methodology to understand how we develop realistic attack scenarios, facilitate collaborative exercises, and assess your organization's incident response readiness.

Read Methodology
Methodologies

Bishop Fox Social Engineering Methodology

Bishop Fox Social Engineering Methodology

Get Bishop Fox's social engineering testing methodology. See how we simulate phishing, vishing, and physical attacks to strengthen your security awareness.

Read Methodology
Guides

Cybersecurity Style Guide v2.0

Cybersecurity Style Guide v2.0

Designed for security researchers, this guide is an invaluable resource for advice on which cybersecurity terms to use in reports and how to use them correctly.

Read Guide
Datasheets

Threat Modeling Datasheet

Threat Modeling Datasheet

Learn how threat modeling proactively addresses security issues across the software development life cycle with in-depth analysis of application design, threats, and countermeasures that become foundational to ongoing DevOps processes.

Download Datasheet
Datasheets

Social Engineering Datasheet

Social Engineering Datasheet

Learn how social engineering goes beyond conventional phishing exercises to explore the depths of how adversaries can exploit your users, empowering you with insights to improve your security awareness program and related controls like email and file security.

Download Datasheet
Datasheets

Secure Code Review Datasheet

Secure Code Review Datasheet

Learn how secure code review combines cutting-edge automation with meticulous manual review, ensuring the full spectrum of code-base vulnerabilities are proactively eliminated before attackers have a fighting chance.

Download Datasheet
Datasheets

Ransomware Readiness Datasheet

Ransomware Readiness Datasheet

Learn how to obtain a thorough assessment of your organization’s resilience to ransomware threats by applying the latest intelligence, attacker TTPs, and world-class experience so you can effectively communicate relevant risks to your leadership and refine your strategy.

Download Datasheet
Datasheets

Product Security Review Datasheet

Product Security Review Datasheet

Learn how to fortify your device security by leveraging a multi-point testing methodology that extends beyond known vulnerabilities to keep security issues from reaching production and avoiding real-world attacks.

Download Datasheet
Datasheets

Incident Response Tabletop Datasheet

Incident Response Tabletop Datasheet

Learn how to enable your organization to accurately evaluate incident response readiness by immersing your key stakeholders in realistic and customized threat scenarios designed specifically for your business.

Download Datasheet
Datasheets

Hybrid Application Assessment Datasheet

Hybrid Application Assessment Datasheet

Learn how to uncover the full spectrum of application security risks and code-level vulnerabilities with automated and manual testing methods.

Download Datasheet
Datasheets

Cloud Penetration Testing Datasheet

Cloud Penetration Testing Datasheet

Learn how cloud penetration testing can help fortify your cloud defenses with a complete testing methodology that extends beyond configuration reviews to illuminate high-risk entry points, overprivileged access, and susceptible internal pathways that are commonly targeted by attackers.

Download Datasheet
Solution Briefs

Architecture Security Assessment Solution Brief

Architecture Security Assessment Solution Brief

Learn how our assessment puts your applications and underlying security architecture under the microscope, illuminating critical flaws and systemic improvements that enhance existing security controls and harden defenses against the speed and precision of modern adversaries.

Read Briefing
Datasheets

Architecture Security Assessment Datasheet

Architecture Security Assessment Datasheet

Learn how our assessment puts your applications and underlying security architecture under the microscope, illuminating critical flaws and systemic improvements that enhance existing security controls and harden defenses against the speed and precision of modern adversaries.

Download Datasheet

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.