AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Methodologies

Bishop Fox Secure Code Review Methodology

Bishop Fox Secure Code Review Methodology

Overview of Bishop Fox’s methodology for Secure Code Review.

Read Methodology
Virtual Sessions

SC Media Special Event: Continuously Hacking Yourself

SC Media Special Event: Continuously Hacking Yourself

Explore the benefits of continually hacking yourself to discover new assets (including many you don’t even know you have) and their associated vulnerabilities.

Watch Session
Guides

Evaluating Offensive Security Solutions: Top 50 Questions to Ask

Evaluating Offensive Security Solutions: Top 50 Questions to Ask

To ensure your security investments offer complete visibility into your attack surface and uncover critical risks at scale, we've compiled questions to help you evaluate solutions. We focus on six key areas: attack surface discovery, exposure identification, triage, validation, remediation, and outputs.

Read Guide
Guides

SW Labs Category Overview: Attack Surface Management (ASM) Solutions

SW Labs Category Overview: Attack Surface Management (ASM) Solutions

Comprehensive overview of the fast-growing Attack Surface Management category from the cybersecurity experts at Security Weekly Labs.

Read Guide
Guides

SW Labs Product Review: Cosmos Attack Surface Management Platform

SW Labs Product Review: Cosmos Attack Surface Management Platform

SW Labs assessed Bishop Fox’s Cosmos (formerly CAST) the “Best Emerging Technology" Attack Surface Management Platform of 2021.

Read Guide
Guides

The Wolf in Sheep’s Clothing

The Wolf in Sheep’s Clothing

See how low-risk exposures can become catalysts for destructive attacks. We include examples of exposures found in real-world environments, including a step-by-step view into how ethical hackers exploited them to reach high-value targets.

Read Guide
Virtual Sessions

Cracking the Code: Secure Code Review in DevSecOps

Cracking the Code: Secure Code Review in DevSecOps

On-demand webcast offers an in-depth look at how DevOps can integrate both automated and manual code review into the software development lifecycle.

Watch Session
Virtual Sessions

The Wolf in Sheep's Clothing: How Innocuous Exposures Become Infamous

The Wolf in Sheep's Clothing: How Innocuous Exposures Become Infamous

In the hands of skilled attackers, many "low risk" exposures serve as launching pads or steppingstones to more complex and destructive attacks. Join our webcast as we dive into real-world examples.

Watch Session
Virtual Sessions

What Bad Could Happen? Managing Application Risk with Threat Modeling

What Bad Could Happen? Managing Application Risk with Threat Modeling

What if security could become an integral framework within the software development process? Join Tom Eston and Chris Bush to learn how Threat Modeling is changing the way organizations manage application security risks.

Watch Session
Virtual Sessions

A Deep Dive Into Fuzzing

A Deep Dive Into Fuzzing

Get the buzz on fuzz testing in software development.

Watch Session
Virtual Sessions

Outpacing the Speed and Precision of Modern Attackers with Continuous Attack Surface Testing

Outpacing the Speed and Precision of Modern Attackers with Continuous Attack Surface Testing

On-demand webcast provides an in-depth look at using Continuous Attack Surface Testing (CAST) to identify and close attack windows before it’s too late.

Watch Session
Guides

Penetration Testing Resource Guide

Penetration Testing Resource Guide

This handy guide provides a list of great resources for learning to be a pen tester.

Read Guide
Virtual Sessions

How to Build a DevSecOps Program that Works for Developers AND Security

How to Build a DevSecOps Program that Works for Developers AND Security

On-demand webcast explores how the right DevSecOps strategy empowers both your security and development teams.

Watch Session
Virtual Sessions

DevSecOps and Application Penetration Testing: Defying the Myth

DevSecOps and Application Penetration Testing: Defying the Myth

On-demand webcast dives into the role of application penetration testing in today’s software development lifecycle (SDLC).

Watch Session
Customer Stories

Gravity-Defying Security: An Apollo.io Story

Gravity-Defying Security: An Apollo.io Story

Apollo selected Bishop Fox to perform a Google Security Assessment to evaluate the security of its application, external perimeter, and Google Cloud Platform (GCP) environment, as well as conduct a review of its responses to Google’s required self-assessment questionnaire (SAQ).

Read Story
Virtual Sessions

Tool Talk: Eyeballer

Tool Talk: Eyeballer

In Episode 1 of our Tool Talk series we explore Eyeballer, an AI-powered, open-source tool designed to help penetration testers assess large-scale external perimeters.

Watch Session
Workshops & Training

Fuzzing: Get the buzz on fuzz testing in software development

Fuzzing: Get the buzz on fuzz testing in software development

This slide deck includes:

  • Fuzzing Basics
  • How Fuzzing Works
  • Popular Fuzzing Tools

Watch Workshop
Virtual Sessions

Log4j Vulnerability: A Fireside Chat

Log4j Vulnerability: A Fireside Chat

Join our panelists as they dive into the attacker’s perspective and how you can identify unusual activity and harden systems against further compromise.

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Jayson Street

Bishop Fox Live at DEF CON 30 featuring Jayson Street

Listen to Jayson E. Street, Hacker & Author of "Dissecting the Hack: The F0rb1dd3n Network," discuss his hacking adventures with Bishop Fox hosts Tom Eston and Joe Sechman during our inaugural 2022 DEF CON livestream!

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Ray Espinoza

Bishop Fox Live at DEF CON 30 featuring Ray Espinoza

Tune in as Ray Espinoza, CISO at Inspectiv, discusses coaching in security, making infosec more diverse, doing vulnerability management, and more!

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Raghu Nandakumara

Bishop Fox Live at DEF CON 30 featuring Raghu Nandakumara

Hear Raghu Nandakumara, Senior Director and Head of Solutions at Illumio, discuss ransomware and zero-trust segmentation.

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Kevin Johnson

Bishop Fox Live at DEF CON 30 featuring Kevin Johnson

Check out Kevin Johnson, co-host of The Shared Security Show Podcast, discuss topics like open-source, the OWASP SamuraiWTF, and application security!

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Vinnie Liu

Bishop Fox Live at DEF CON 30 featuring Vinnie Liu

Listen to this exclusive interview with Bishop Fox CEO Vinnie Liu where he shares his opinion on various cybersecurity trends and hot topics.

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Alethe Denis

Bishop Fox Live at DEF CON 30 featuring Alethe Denis

Listen to social engineering expert Alethe Denis share her stories and insight with our DEF CON livestream hosts Tom Eston and Joe Sechman.

Watch Session

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.