Featured Resource

Bishop Fox Livestream at DEF CON 32

Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.

Methodology

Bishop Fox Secure Code Review Methodology

Overview of Bishop Fox’s methodology for Secure Code Review.

Webcast

SC Media Special Event: Continuously Hacking Yourself

Explore the benefits of continually hacking yourself to discover new assets (including many you don’t even know you have) and their associated vulnerabilities.

Guide

Evaluating Offensive Security Solutions: Top 50 Questions to Ask

To ensure your security investments offer complete visibility into your attack surface and uncover critical risks at scale, we've compiled questions to help you evaluate solutions. We focus on six key areas: attack surface discovery, exposure identification, triage, validation, remediation, and outputs.

Report

SW Labs Category Overview: Attack Surface Management (ASM) Solutions

Comprehensive overview of the fast-growing Attack Surface Management category from the cybersecurity experts at Security Weekly Labs.

Report

SW Labs Product Review: Cosmos Attack Surface Management Platform

SW Labs assessed Bishop Fox’s Cosmos (formerly CAST) the “Best Emerging Technology" Attack Surface Management Platform of 2021.

Guide

The Wolf in Sheep’s Clothing

See how low-risk exposures can become catalysts for destructive attacks. We include examples of exposures found in real-world environments, including a step-by-step view into how ethical hackers exploited them to reach high-value targets.

Webcast

Cracking the Code: Secure Code Review in DevSecOps

On-demand webcast offers an in-depth look at how DevOps can integrate both automated and manual code review into the software development lifecycle.

Webcast

The Wolf in Sheep's Clothing: How Innocuous Exposures Become Infamous

In the hands of skilled attackers, many "low risk" exposures serve as launching pads or steppingstones to more complex and destructive attacks. Join our webcast as we dive into real-world examples.

Webcast

What Bad Could Happen? Managing Application Risk with Threat Modeling

What if security could become an integral framework within the software development process? Join Tom Eston and Chris Bush to learn how Threat Modeling is changing the way organizations manage application security risks.

Webcast

Tool Talk: Fuzzing

Get the buzz on fuzz testing in software development.

Webcast

Outpacing the Speed and Precision of Modern Attackers with Continuous Attack Surface Testing

On-demand webcast provides an in-depth look at using Continuous Attack Surface Testing (CAST) to identify and close attack windows before it’s too late.

Guide

Penetration Testing Resource Guide

This handy guide provides a list of great resources for learning to be a pen tester.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.