New from Ponemon Institute: The State of Offensive Security in 2023. Read the Report ›
Tool Talk: ripgen
In our fifth edition of the Tool Talk series, we explore ripgen, a subdomain discovery tool designed to significantly increase permutation combinations.
Achieving Warp Speed to Continuous Testing: How to Calculate ROI for your Business
Uncover your organization’s unique cost savings and risk mitigation strategy for a continuous offensive testing solution with our customized ROI calculation.
Combating Ransomware with an Offensive Roadmap
Examine your organization’s level of ransomware preparedness through the lens of offensive security considerations.
Bishop Fox Secure Code Review Methodology
Overview of Bishop Fox’s methodology for Secure Code Review.
SC Media Special Event: Continuously Hacking Yourself
Explore the benefits of continually hacking yourself to discover new assets (including many you don’t even know you have) and their associated vulnerabilities.
Evaluating Offensive Security Solutions: Top 50 Questions to Ask
To ensure your security investments offer complete visibility into your attack surface and uncover critical risks at scale, we've compiled questions to help you evaluate solutions. We focus on six key areas: attack surface discovery, exposure identification, triage, validation, remediation, and outputs.
SW Labs Category Overview: Attack Surface Management (ASM) Solutions
Comprehensive overview of the fast-growing Attack Surface Management category from the cybersecurity experts at Security Weekly Labs.
SW Labs Product Review: Cosmos Attack Surface Management Platform
SW Labs assessed Bishop Fox’s Cosmos (formerly CAST) the “Best Emerging Technology" Attack Surface Management Platform of 2021.
The Wolf in Sheep’s Clothing
See how low-risk exposures can become catalysts for destructive attacks. We include examples of exposures found in real-world environments, including a step-by-step view into how ethical hackers exploited them to reach high-value targets.
Cracking the Code: Secure Code Review in DevSecOps
On-demand webcast offers an in-depth look at how DevOps can integrate both automated and manual code review into the software development lifecycle.
The Wolf in Sheep's Clothing: How Innocuous Exposures Become Infamous
In the hands of skilled attackers, many "low risk" exposures serve as launching pads or steppingstones to more complex and destructive attacks. Join our webcast as we dive into real-world examples.
What Bad Could Happen? Managing Application Risk with Threat Modeling
What if security could become an integral framework within the software development process? Join Tom Eston and Chris Bush to learn how Threat Modeling is changing the way organizations manage application security risks.