9 OSINT Tools For Your Reconnaissance Needs
There’s no shortage of OSINT tools, techniques, and other resources – in fact, there’s so much stuff, it’s a little overwhelming to try and sort through it all. Writing a “best of” or otherwise...
View ArticleContinuous Security: Threat Modeling in DevSecOps
Threat modeling can fit in to a DevSecOps program quite well, as it’s inherently a collaborative exercise between security and development.
View ArticleThe Pen Testing Tools We’re Thankful for in 2021
Searching for a pen testing tool to put to use during a security engagement? Check out our annual list of penetration testing tools our consultants have found helpful during this past year.
View ArticleTaking Home Gold: The Best InfoSec Talks & Research of the Year
Lots of research, security talks, and vulnerabilities caught our attention this past year. In this recap, we’ll provide an overview of some of the research we found interesting, some of the talks we...
View ArticlePerceptual Analysis: A Look at Bishop Fox’s New Technology Patent
We’ve achieved a significant milestone in transforming the offensive security space with the recent patent grant award of our innovative technique known as perceptual analysis (US Patent No....
View ArticleMusic To Hack To: Volume 2
We open-sourced our list by asking some of our Discord members to contribute their favorites in addition to folks in the Fox Den.
View ArticleCactusCon 10: Five Security Talks to Watch
Check out a few of our favorite talks from CatcusCon 10.
View ArticleCloud 9: Top Cloud Penetration Testing Tools
You spoke, and we listened! Earlier this year, we asked what pen testing tool list we should publish next. A list that focused on the cloud was the clear crowd favorite. So that being said, here are...
View ArticleWomen of the Fox Den: A Security Roundtable
In honor of Women’s History Month and the paths ladies are forging in cybersecurity, we talked to Foxes about their cybersecurity journeys, their experiences at Bishop Fox, and any advice they have to...
View ArticleCyber Talent: Exploring the Ongoing Shortage & Great Resignation
See how talent shortage and the Great Resignation movement is impacting the cybersecurity workforce, and learn how Bishop Fox approaches recruiting and retention of cybersecurity talent.
View ArticleCybersecurity Mentors: Why & How to Find Your Match
We dispel some misconceptions of finding a mentor and provide some straightforward ideas for developing a mentor-mentee relationship, no matter the stage of your career.
View ArticleRansomware: How Adversaries are Upping the Ante
During the last few years, no other cyber threat has dominated headlines as much as ransomware, with SANS even declaring 2020 and 2021 “the years of ransomware”. Explore the latest ransomware trends,...
View ArticleThe Foxes of Mexico: A Security Roundtable
In honor of Dia del Trabajo (Labor Day) on May 1, we talked to Foxes in Mexico about their cybersecurity journeys, life at Bishop Fox, Mexico as a tech leader, and any advice they have to fellow...
View ArticleGetting Schooled in Security: Bishop Fox Academy
We recently launched Bishop Fox Academy, a company-wide career development and continuous learning program to uphold our position as an offensive security leader.
View ArticleStepping into the Spotlight at Security Conferences
In this blog, we share tips and tricks for how to get involved at security conferences, including which events are our favorite, how to submit CFPs, and tips for enhancing speaking presentations.
View ArticleA 2022 RSA Conference Recap: IRL Edition
Didn't make it to RSA 2022? Or haven't had a chance to use your virtual pass? No problem! Check out our blog recap highlighting our favorite sessions and what we loved about them.
View ArticleVeterans of the Fox Den
Today (and everyday) is the perfect occasion to celebrate our Veterans of the Fox Den. Learn how our veterans served their nation and found cybersecurity as a civilian career path.
View ArticleCapture the Flag to Advance Your Hacking Skills
In this blog, learn why our Foxes enjoy participating in Capture the Flag (CTF) competitions and how it complements their career goals.
View ArticleOrganized: The Kingpins of Cybercrime
In this blog, learn about the transformations that cybercrime groups have undergone and why potential victims should pay attention.
View ArticleOur Favorite Week of the Year
In this blog, find out what security experts are excited for during this year's Black Hat and DEF CON week.
View Article