Case Study Securing IoTium
Evaluating Security of an Industrial IoT Platform
IoTium, a solution designed for the Industrial Internet of Things (IIoT), enlisted Bishop Fox to verify the security of their product offering.
We don't just consult.
We write. We present. We inspire.
We created the Google Hacking Diggity Project, the Danger Drone, and the Tastic RFID Thief. Mr. Robot is featuring our tools! We share our research with the security community. We have several popular open-source tools available to the community.
Our security experts have appeared in the Wall Street Journal, New York times, Wired, Dark Reading, Forbes, SC Magazine, Fortune, and many more. We've been quoted in USA Today and featured on Al Jazeera world news.
Our books include Hacking Exposed: Web Applications, Penetration Tester's Open Source Toolkit, and many more.
We regularly present at Black Hat, DEF CON, and other leading conferences. We also take the time to share security intel with our customers. We help our clients stay on the cutting edge of security.
Sharing Our Research
Drones for Penetration Testers
Practical guide to Drone hacking for penetration testers. Helping equip security professionals with the tools to test the effectiveness of their drone defenses and eliminate exposed attack vectors.
Practical guide to RFID hacking for penetration testers. Investigates the latest attack tools and techniques available for stealing and using RFID proximity badge information to gain unauthorized access to buildings and other secure areas.