Pathways to Security: A Look at University, Military and STEM Programs
Level up your knowledge of university, military and STEM pathways into the cybersecurity industry to start planning your career journey.
View ArticleKnow Your Enemy, Know Yourself: Examining the Mind of a Cyber Attacker
We partnered with SANS to bring you a groundbreaking report that explores the minds and methodologies of modern cyber adversaries. See what inspired our research and get access to the full report.
View ArticleSharing the Power of Cybersecurity Awareness
In honor of Cybersecurity Awareness Month, we've gathered our top tips to help your family, friends, and community members stay safer in the virtual world.
View ArticleBehind the Scenes, New Insights from SANS Hacker Survey
Get inside the mind of a hacker with highlights from our webcast, Hacker Insights Revealed; New SANS Survey Results
View ArticleDon't Get Caught in the Dark: How to Build Better Documentation for Security...
In this blog, we share our recommendations for improving technical documentation guidelines and strategies for security teams.
View ArticleHow to Go from Active Duty to Civilian Cybersecurity
In this blog, learn how veterans bridge the career gap between active duty service and civilian cybersecurity.
View ArticleA CISO's Approach to Ransomware Playbooks
Get a CISO's perspective on testing your security defenses against real-world ransomware playbooks.
View ArticleThe Latest in Ransomware: A Path of Cyber Destruction
In this blog, we share a roundup of recent ransomware events, how ransomware continues to forge a path of destruction, and shed light on efforts to slow the pace of attacks.
View ArticleA Hacker Holiday Gift Guide
Need gift ideas for your favorite hackers? We've got you covered with our Hacker Holiday Gift Guide.
View ArticleOur Favorite Tools of the Year: 2022 Edition
Check out out favorite pen testing tools that we loved using in 2022!
View Article2023 Offensive Security Resolutions from the Fox Den
Get familiar with Bishop Fox's most important offensive security resolutions for 2023.
View Article8 Network Pen Testing Tools for Your Hacker Arsenal
Check out our recommendations for top network pen testing tools to level up your hacking skills.
View ArticleThe Top 12 Hacking Influencers to Follow
Check out this blog to learn about our favorite influencers to follow on the hacker scene.
View ArticleRed Teaming: The Ultimate Sanity Check for Security Teams
Learn how to take control of security program investments with Red Teaming.
View ArticleThe Women Behind the Writing
Get to the know a few of the women behind the technical editorial team at Bishop Fox and learn about the criticality of clear, continuous, and consistent communication with customers.
View ArticleWomen of the Fox Den - A Unique Hacking Perspective
Get highlights from our International Women's Day livestream roundtable, Defend Like a Girl: Hacking Your Way to Cyber Success.
View ArticleBank Vault or Screen Door? How Attackers View Financial Services
Bank vault or screen door? Learn how FinServ attack surfaces appear to a hacker, how they prefer to exploit, and where they look for vulnerabilities.
View ArticleUsing LinkedIn to Land Your Dream Cybersecurity Job
Learn how to get recruiters' attention on LinkedIn with expert tips from a Bishop Fox recruiting manager.
View ArticleGeek Out: Technology Museums to Visit This Summer
Check out our recommendations for technology museums to visit this summer.
View ArticleArchitecting An Offensive Security Blueprint: 2023 Insights From the Ponemon...
Learn how mature organizations are designing offensive security blueprints to defend forward against today's most advanced adversaries and threats.
View ArticleCloud Offensive Security: 2023 Insights From the Ponemon Institute
In this blog, we explore how offensive security solutions are implemented by mature organizations to proactively protect cloud environments.
View ArticleA Bishop Fox Recap - Hacker Summer Camp 2023
Get a Bishop Fox recap of the 2023 Hacker Summer Camp in Las Vegas.
View ArticleThe Dark Side of Convenience: Understanding the Dangers of Digital Supply Chain
Dive into this blog for an offensive security perspective on the dangers of the digital supply chain.
View ArticleFinancial Services: 2023 Insights From the Ponemon Institute
Get a sneak peek into why FinServ organizations are at the forefront of offensive security.
View ArticleRed Teaming: 2023 Insights from the Ponemon Institute
Learn why mature organizations turn to Red Teaming to improve cybersecurity resiliency.
View ArticleHealthcare: 2023 Insights from the Ponemon Institute
Get insights into offensive security trends in the healthcare sector with data from the Ponemon Institute’s 2023 State of Offensive Security Report.
View ArticlePurple Teaming: Validating Cybersecurity Investments and Enhancing Efficiency
Learn how Purple Teaming brings together offensive and defensive strategies for a more comprehensive and impactful cybersecurity approach.
View ArticleStrengthening Cybersecurity Defenses: Validating Incident Response Plans with...
In this blog, learn how Bishop Fox Red Team tabletop exercises help organizations test Incident Response plans against tactics, techniques, and procedures used by attackers.
View ArticleNavigating Threats: Adopting Proactive Social Engineering and Network Testing...
Get insights from Bishop Fox experts on social engineering tactics, implementing technical controls, and the importance of internal network testing.
View ArticleMust-Listen Top Cybersecurity Podcasts
Interested in finding new ways to learn about the cybersecurity industry? Check this list of our must-listen top podcasts to hear from industry leading experts!
View ArticleEnabling Proper PCI Testing with External Penetration Tests
Gain actionable insights on how to maximize external penetration testing to develop comprehensive PCI security strategies.
View ArticleThe Bishop Fox Internship Program: Mexico Foxes Assemble!
Learn about our internship program for Mexico-based penetration testers.
View ArticleEl Programa de Interns de Bishop Fox: Foxes de México Assemble!
En Bishop Fox, siempre estamos buscando crear la próxima generación de Avengers de la seguridad ofensiva a través de nuestro innovador internship program.
View ArticleUnlocking Job Opportunities with LinkedIn and Artificial Intelligence
Learn how to upgrade your job search in LinkedIn with helpful AI prompts and tips from an industry-leading recruiter.
View ArticleImplementing the FDA's 2023 Requirements for Medical Device Cybersecurity
Gain actionable tips to operationalize the FDA's 2023 legislation, H.R. 2617 Section 524B product security requirements for medical devices.
View ArticlePractical Measures for AI and LLM Security: Securing the Future for Enterprises
Gain insights into how enterprises can take a pragmatic and informed approach to AI and LLM technology adoption, ensuring reduced security risks.
View ArticleTechnology and Software: 2023 Insights From the Ponemon Institute
Gain cutting edge insights into offensive security strategies used by the Technology & Software industry.
View ArticleStrengthen Security to Mitigate Third-Party Risks
Explore highlights from a recent webcast where special guest Anirban Banerjee, CEO and co-founder of partner Riscosity, and Matt Twells, senior solutions architect, explore critical considerations for...
View ArticleHow Does Social Engineering Work? From Planning to Execution
Discover the key points from our webcast, "How Does Social Engineering Work? in this recap blog.
View ArticleLeveraging Offensive Security for Effective Post-Attack Recovery
Bishop Fox's CISO Christie Terrill and former VP of Consulting Tom Eston discuss leveraging offensive security strategies for effective post-attack recovery, providing practical steps for remediation...
View ArticleManipulating the Mind: The Strategy and Practice of Social Engineering
Explore the intricacies of social engineering, explore its various forms, and describe how adversaries set, define, and achieve objectives leveraging social engineering tactics and strategies.
View ArticleOffensive Security Under the EU Digital Operational Resilience Act (DORA)
Explore the EU's new DORA regulation and how financial entities and their ICT vendors must promptly align their security frameworks with DORA's requirements to mitigate potential risks and ensure...
View ArticleAdversarial Controls Testing: A Step to Cybersecurity Resilience
Take an in-depth look at Adversarial Controls Testing assessments (ACT), an offensive security testing approach that evaluates the effectiveness of an organization's email, endpoint, and network...
View ArticleNavigating DORA Compliance: A Comprehensive Approach to Threat-Led...
Explore how organizations can strategically prepare for and execute TLPT to meet DORA compliance while strengthening overall cybersecurity resilience.
View ArticleOff the Fox Den Bookshelf: Security and Tech Books We Love
We've polled our team and are back with our 2024 cybersecurity book recommendations to help you level up your cybersecurity skills.
View ArticleOur Favorite Pen Testing Tools: 2024 Edition
It's time for another hacking tool roundup! We’ve polled our team of experts to bring you the most powerful and innovative penetration testing tools.
View ArticleNavigating Workplace Security: Red Team Insights for the Return to Office
Review how Red Team insights can shed light on gaps in physical security and play a pivotal role in enhancing workplace security during the continued transition back to office environments as we...
View ArticleHacking the Norm: Unique Career Journeys into Cybersecurity
The unique career journeys of Foxes highlight that passion, curiosity, and a willingness to explore can open doors to impactful roles in cybersecurity. Check out a few of their stories.
View ArticleFrom Dial Tone to Throne: IVR Testing in the Spirit of The King of NYNEX
Explores IVR penetration testing methodologies, common vulnerabilities, and strategies to secure these critical systems against modern threats.
View Article