Executive brief on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing. Watch Now

Featured Resource

Red Teaming: Is Your Security Program Ready for the Ultimate Test?

In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.

Bishop Fox virtual session on scaling security featuring industry experts discussing lessons from Salesforce AppExchange.
Executive Briefing

Scaling Application Security: Lessons from Salesforce AppExchange

Join top security leaders from Bishop Fox, AppOmni, and Guidewire as they reveal how Salesforce AppExchange set the standard for scalable SaaS security—packed with real-world insights to future-proof your security strategy.

Virtual event titled "AI War Stories: Silent Failures, Real Consequences" exploring real-world AI security incidents and silent compliance vulnerabilities.
Virtual Session

AI War Stories: Silent Failures, Real Consequences

AI doesn’t crash when compromised—it complies. Join Jessica Stinson as she shares real-world AI security failures, revealing how trusted tools are silently hijacked. Learn to spot hidden risks and build resilient AI defenses before silence turns into breach.

To ensure its real-time AI platform could withstand sophisticated threats, a global SaaS company partnered with Bishop Fox for its first full red team assessment.
Customer Story

Red Team Activated: Testing a Global Risk Intelligence Platform

To ensure its real-time AI platform could withstand sophisticated threats, a global SaaS company partnered with Bishop Fox for its first full red team assessment.

Ventrilo tested their AI writing assistance platform with application penetration testing and AI/LLM security assessments.
Customer Story

Enhancing AI Security: How Ventrilo.ai Revolutionizes Writing Assistance

Ventrilo.ai partnered with Bishop Fox for application penetration testing and AI security assessments to ensure its writing assistant protects sensitive user data and withstands real-world threats.

Red Team Readiness Guide - Key questions to ask before a red team engagement. Bishop Fox resource for assessing cybersecurity preparedness.
Guide

Red Team Readiness Guide

The Red Team Readiness Guide is a practical, question-driven planning framework that helps security leaders align stakeholders, clarify objectives, and evaluate organizational readiness ahead of a Red Team engagement. Use it to avoid common pitfalls, define business-relevant goals, and set the stage for maximum impact.

Bishop Fox solution brief on AI security testing for large language models (LLMs), featuring human-led adversarial prompt testing, social engineering techniques, and expert methodologies to assess and secure intelligent systems.
Solution Brief

The Human Element of AI Security Solution Brief

Learn how expert-driven testing goes beyond automation to thoroughly assess AI and LLM applications with techniques grounded in human behavior and social engineering.

Subscribe to our blog and advisories

Be first to learn about latest tools, advisories, and findings.

Bishop Fox Red Team Readiness Assessment resource image, featuring bold red and gray text over a black background and a preview of a planning questionnaire for red team engagement objectives.
Guide

Red Team Readiness Assessment

The Red Team Readiness Assessment is a guided self-assessment worksheet that helps security teams evaluate their preparedness, align stakeholders, and plan more effective Red Team engagements. Use it to define objectives, set scope, and establish the protocols needed for a successful simulation.

Promotional banner for virtual session titled 'Breaking AI: Inside the Art of LLM Pen Testing' featuring stylized graphics of a laptop and glitch art design elements.
Virtual Session

Breaking AI: Inside the Art of LLM Pen Testing

Learn why traditional penetration testing fails on LLMs. Join Bishop Fox’s Brian D. for a deep dive into adversarial prompt exploitation, social engineering, and real-world AI security techniques. Rethink how you test and secure today’s most powerful models.

Bold graphic with black background promoting a Sliver Framework workshop titled 'Sliver: Staging & Automation'; features white and neon yellow text, Sliver logo in a white box, and digital glitch-style accents in magenta, cyan, and yellow on the edges.
Workshops & Training

Sliver Workshop Part 2: Staging & Automation

In our second workshop, we’ll explore Sliver’s new implant staging process and demonstrate basic CLI automation features. We’ll also walk through Sliver’s supported pivot types for lateral movement, including TCP, and wrap up by exploring automation options using the SliverPy project.

bfx25_Red team solution brief ft
Solution Brief

Red Team & Adversarial Emulation Solution Brief

With a range of approaches that simulate breach scenarios at your organization, adversarial emulation is the most effective way to know if your team is prepared to detect, respond, and recover—before a real breach happens.

Virtual session titled 'Architecting Cloud Security Testing in the GenAI Era' featuring modern typography and abstract technical design elements.
Virtual Session

Architecting Cloud Security Testing in the GenAI Era

Join Steven Smiley and Jessica Stinson for a deep dive into how early-stage architectural reviews can transform the effectiveness of your testing. Whether you're navigating IAM setups or preparing to tackle GenAI risks in cloud environments, this session has the clarity and direction you need to test smarter—not just harder.

Sliver Framework Getting Started and 1.6 Features Event image with Bishop Fox branding.
Workshops & Training

Sliver Workshop Part 1: Getting Started & 1.6 Features

Watch an interactive workshop led by Bishop Fox Senior Security Consultant, Tim Ghatas, as we dive into Sliver, the open-source C2 framework making waves in Red Team ops.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.