Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.
The Art of Hacking: Livestream from DEF CON 31
Join us Friday, August 11, 2023 for a livestream from DEF CON 31 to hear seasoned hackers and cybersecurity experts uncover the intricacies of ethical hacking and how the hacker spirit can be harnessed to push the boundaries of technology.
Outpacing Adversaries in the Cloud: An Offensive Security Guide
Download our guide to discover the current challenges in securing the cloud, the approach offensive security takes through cloud penetration testing, and the differences and advantages of investing in CPTs as part of a cloud security program.
The Art & Science of Cyber Leadership Series
Our new series brings together CISOs, industry authorities, and analysts in conversation to provide perspectives to help you navigate the rapidly changing cyber landscape and inform the decisions you make for your organization.
Ponemon Institute Report 2023
In a new study conducted with Bishop Fox, the Ponemon Institute surveyed nearly 700 security and IT practitioners who actively employ offensive security practices. The analysis explores where enterprises are focusing offensive security efforts and the drivers behind them.
What the Vuln Series: Quarterly Roundup
Watch the third episode of our What the Vuln technical series as we share the most intriguing vulnerabilities that we encountered in Q2 2023 and how we hacked them.
Get the Blueprint: Insights from Ponemon Institute’s 2023 State of Offensive Security Study
Hear from experts Larry Ponemon & Tom Eston, as they reveal our findings from a joint report with the Ponemon Institute on the 'State of Offensive Security' in 2023.
Getting Red Teaming Right: A How-to Guide
Read our eBook to learn how Red Teaming can provide the ultimate training ground for your defenses, assessing how well (or not) intrusions are detected and how an attacker can move throughout your network to achieve exfiltration.
How the New National Cybersecurity Strategy Will Shape the Future of Offensive Security
Join Bishop Fox for a fireside chat with renowned cybersecurity experts – Evan Wolff & Justin Greis. We’ll discuss how new proposed regulations will impact offensive security initiatives, both short- and long-term.
OWASP ASVS Demystified: A Practical Guide to Web Application Security Testing
In this technical guide, offensive security expert Shanni Prutchi provides analysis of the entire 278 verification requirements listed in OWASP's ASVS standard to assist in the generation of test cases and provide context to companies looking to test their applications against the standard.
IDC Spotlight - Continuous Prevention: How Attack Surface Management Reduces Risk
Get new analyst insights on the benefits of continuous testing.
Notes from the Dark Side: What Our Data Reveals About the Attack Surface
Join our offensive security experts as they share insights gleaned from analyzing twelve months of findings captured in Cosmos, our award-winning attack surface management platform.
Tool Talk: Burp Suite Extensions
Learn how to power up web application security testing with tips on creating customized extensions featuring BurpCage, an extension that replaces any image proxied through Burp Suite leveraging the Montoya API.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.