Quantcast
Channel: bishopfox.com
Browsing latest articles
Browse All 76 View Live

Pathways to Security: A Look at University, Military and STEM Programs

Level up your knowledge of university, military and STEM pathways into the cybersecurity industry to start planning your career journey.

View Article


Know Your Enemy, Know Yourself: Examining the Mind of a Cyber Attacker

We partnered with SANS to bring you a groundbreaking report that explores the minds and methodologies of modern cyber adversaries. See what inspired our research and get access to the full report.

View Article


Sharing the Power of Cybersecurity Awareness

In honor of Cybersecurity Awareness Month, we've gathered our top tips to help your family, friends, and community members stay safer in the virtual world.

View Article

Behind the Scenes, New Insights from SANS Hacker Survey

Get inside the mind of a hacker with highlights from our webcast, Hacker Insights Revealed; New SANS Survey Results

View Article

Don't Get Caught in the Dark: How to Build Better Documentation for Security...

In this blog, we share our recommendations for improving technical documentation guidelines and strategies for security teams.

View Article


How to Go from Active Duty to Civilian Cybersecurity

In this blog, learn how veterans bridge the career gap between active duty service and civilian cybersecurity.

View Article

A CISO's Approach to Ransomware Playbooks

Get a CISO's perspective on testing your security defenses against real-world ransomware playbooks.

View Article

The Latest in Ransomware: A Path of Cyber Destruction

In this blog, we share a roundup of recent ransomware events, how ransomware continues to forge a path of destruction, and shed light on efforts to slow the pace of attacks.

View Article


A Hacker Holiday Gift Guide

Need gift ideas for your favorite hackers? We've got you covered with our Hacker Holiday Gift Guide.

View Article


Our Favorite Tools of the Year: 2022 Edition

Check out out favorite pen testing tools that we loved using in 2022!

View Article

2023 Offensive Security Resolutions from the Fox Den

Get familiar with Bishop Fox's most important offensive security resolutions for 2023.

View Article

8 Network Pen Testing Tools for Your Hacker Arsenal

Check out our recommendations for top network pen testing tools to level up your hacking skills.

View Article

The Top 12 Hacking Influencers to Follow

Check out this blog to learn about our favorite influencers to follow on the hacker scene.

View Article


Red Teaming: The Ultimate Sanity Check for Security Teams

Learn how to take control of security program investments with Red Teaming.

View Article

The Women Behind the Writing

Get to the know a few of the women behind the technical editorial team at Bishop Fox and learn about the criticality of clear, continuous, and consistent communication with customers.

View Article


Women of the Fox Den - A Unique Hacking Perspective

Get highlights from our International Women's Day livestream roundtable, Defend Like a Girl: Hacking Your Way to Cyber Success.

View Article

Bank Vault or Screen Door? How Attackers View Financial Services

Bank vault or screen door? Learn how FinServ attack surfaces appear to a hacker, how they prefer to exploit, and where they look for vulnerabilities.

View Article


Using LinkedIn to Land Your Dream Cybersecurity Job

Learn how to get recruiters' attention on LinkedIn with expert tips from a Bishop Fox recruiting manager.

View Article

Geek Out: Technology Museums to Visit This Summer

Check out our recommendations for technology museums to visit this summer.

View Article

Architecting An Offensive Security Blueprint: 2023 Insights From the Ponemon...

Learn how mature organizations are designing offensive security blueprints to defend forward against today's most advanced adversaries and threats.

View Article

Cloud Offensive Security: 2023 Insights From the Ponemon Institute

In this blog, we explore how offensive security solutions are implemented by mature organizations to proactively protect cloud environments.

View Article


A Bishop Fox Recap - Hacker Summer Camp 2023

Get a Bishop Fox recap of the 2023 Hacker Summer Camp in Las Vegas.

View Article


The Dark Side of Convenience: Understanding the Dangers of Digital Supply Chain

Dive into this blog for an offensive security perspective on the dangers of the digital supply chain.

View Article

Financial Services: 2023 Insights From the Ponemon Institute

Get a sneak peek into why FinServ organizations are at the forefront of offensive security.

View Article

Red Teaming: 2023 Insights from the Ponemon Institute

Learn why mature organizations turn to Red Teaming to improve cybersecurity resiliency.

View Article


Healthcare: 2023 Insights from the Ponemon Institute

Get insights into offensive security trends in the healthcare sector with data from the Ponemon Institute’s 2023 State of Offensive Security Report.

View Article

Purple Teaming: Validating Cybersecurity Investments and Enhancing Efficiency

Learn how Purple Teaming brings together offensive and defensive strategies for a more comprehensive and impactful cybersecurity approach.

View Article

Strengthening Cybersecurity Defenses: Validating Incident Response Plans with...

In this blog, learn how Bishop Fox Red Team tabletop exercises help organizations test Incident Response plans against tactics, techniques, and procedures used by attackers.

View Article

Navigating Threats: Adopting Proactive Social Engineering and Network Testing...

Get insights from Bishop Fox experts on social engineering tactics, implementing technical controls, and the importance of internal network testing.

View Article



Must-Listen Top Cybersecurity Podcasts

Interested in finding new ways to learn about the cybersecurity industry? Check this list of our must-listen top podcasts to hear from industry leading experts!

View Article

Enabling Proper PCI Testing with External Penetration Tests

Gain actionable insights on how to maximize external penetration testing to develop comprehensive PCI security strategies.

View Article

The Bishop Fox Internship Program: Mexico Foxes Assemble!

Learn about our internship program for Mexico-based penetration testers.

View Article

El Programa de Interns de Bishop Fox: Foxes de México Assemble!

En Bishop Fox, siempre estamos buscando crear la próxima generación de Avengers de la seguridad ofensiva a través de nuestro innovador internship program.

View Article


Unlocking Job Opportunities with LinkedIn and Artificial Intelligence

Learn how to upgrade your job search in LinkedIn with helpful AI prompts and tips from an industry-leading recruiter.

View Article

Implementing the FDA's 2023 Requirements for Medical Device Cybersecurity

Gain actionable tips to operationalize the FDA's 2023 legislation, H.R. 2617 Section 524B product security requirements for medical devices.

View Article

Practical Measures for AI and LLM Security: Securing the Future for Enterprises

Gain insights into how enterprises can take a pragmatic and informed approach to AI and LLM technology adoption, ensuring reduced security risks.

View Article


Technology and Software: 2023 Insights From the Ponemon Institute

Gain cutting edge insights into offensive security strategies used by the Technology & Software industry.

View Article


Which Star Wars Character Fits Your Cybersecurity Style?

View Article

Strengthen Security to Mitigate Third-Party Risks

Explore highlights from a recent webcast where special guest Anirban Banerjee, CEO and co-founder of partner Riscosity, and Matt Twells, senior solutions architect, explore critical considerations for...

View Article

How Does Social Engineering Work? From Planning to Execution

Discover the key points from our webcast, "How Does Social Engineering Work? in this recap blog.

View Article

Leveraging Offensive Security for Effective Post-Attack Recovery

Bishop Fox's CISO Christie Terrill and former VP of Consulting Tom Eston discuss leveraging offensive security strategies for effective post-attack recovery, providing practical steps for remediation...

View Article


Manipulating the Mind: The Strategy and Practice of Social Engineering

Explore the intricacies of social engineering, explore its various forms, and describe how adversaries set, define, and achieve objectives leveraging social engineering tactics and strategies.

View Article

Offensive Security Under the EU Digital Operational Resilience Act (DORA)

Explore the EU's new DORA regulation and how financial entities and their ICT vendors must promptly align their security frameworks with DORA's requirements to mitigate potential risks and ensure...

View Article


Adversarial Controls Testing: A Step to Cybersecurity Resilience

Take an in-depth look at Adversarial Controls Testing assessments (ACT), an offensive security testing approach that evaluates the effectiveness of an organization's email, endpoint, and network...

View Article

Navigating DORA Compliance: A Comprehensive Approach to Threat-Led...

Explore how organizations can strategically prepare for and execute TLPT to meet DORA compliance while strengthening overall cybersecurity resilience.

View Article


Off the Fox Den Bookshelf: Security and Tech Books We Love

We've polled our team and are back with our 2024 cybersecurity book recommendations to help you level up your cybersecurity skills.

View Article

Our Favorite Pen Testing Tools: 2024 Edition

It's time for another hacking tool roundup! We’ve polled our team of experts to bring you the most powerful and innovative penetration testing tools.

View Article

Navigating Workplace Security: Red Team Insights for the Return to Office

Review how Red Team insights can shed light on gaps in physical security and play a pivotal role in enhancing workplace security during the continued transition back to office environments as we...

View Article

Hacking the Norm: Unique Career Journeys into Cybersecurity

The unique career journeys of Foxes highlight that passion, curiosity, and a willingness to explore can open doors to impactful roles in cybersecurity. Check out a few of their stories.

View Article


From Dial Tone to Throne: IVR Testing in the Spirit of The King of NYNEX

Explores IVR penetration testing methodologies, common vulnerabilities, and strategies to secure these critical systems against modern threats.

View Article

Browsing latest articles
Browse All 76 View Live