Bishop Fox Blog

A space dedicated to sharing our thoughts on the latest cybersecurity news, trends, and threats

Subscribe

Subscribe to Blog via Email

Popular Posts:

My Path to Security - How Christie Terrill Got Into Security

How did our consultants end up here? This ongoing series looks at the stories behind our Foxes and their specific career trajectories. (Learn more about Bishop Fox careers at our careers page). 

My Path to Security - How Tom Wilhelm Got Into Security

How did our consultants end up here? This ongoing series looks at the stories behind our Foxes and their specific career trajectories. (Learn more about Bishop Fox careers at our careers page). 

My Path to Security - How Gerben Kleijn Got Into Security

How did our consultants end up here? This ongoing series looks at the stories behind our Foxes and their specific career trajectories. (Learn more about Bishop Fox careers at our careers page). 

An Introduction to AWS Cloud Security


Download the Bishop Fox Intro to AWS Cloud Security guide here. 

Amazon Web Services (AWS) isn’t the novelty it was a decade ago. Resource-intensive, computer-heavy work today flows upward from giant enterprises 24/7 to the nebulous cloud where its processed by virtual servers, stored in digital containers, and eventually returned in a manner that supports the bottom line of tens of thousands of businesses.

My Path to Security - How Joe Ward Got Into Cybersecurity

An ongoing look at why and how our Foxes started their career in security. This is the fourth installment of the series. 

Password Security: The Good, the Bad, and the "Never Should Have Happened"


Download the Bishop Fox password security guide here. 

Introduction to Password Security 

While most organizations have a password policy that sounds technically secure, hardly any have a policy that benefits the organization, encourages strong passwords, and improves overall security. It’s time to stop requiring capital letters, numbers, special characters, and frequent password updates. We are here to correct the outdated, misleading, and muddled logic when it comes to what makes a password secure.

A Primer to Red Teaming


Download the full-length version of the guide including case studies and an introduction to our social engineering services here

Introduction

In order to fully understand red teaming, it might be best to first decouple it from penetration testing. The two are often conflated, and that only serves to lessen the quality of the decision-making around which to choose.

The Latest in Security Style Guide Happenings

The Bishop Fox Cybersecurity Style Guide has been constantly evolving since its initial rollout in February 2018. It’s undergone one other iteration (v1.1, which you can find here) – until now, that is.

My Path to Security - How Matt Frost Got Into Cybersecurity

An ongoing look at why and how our Foxes started their career in security. This is the third installment of the series. 

How 'Small' Security Errors Lead to a Security Breach


A collaboration between Timehop and Bishop Fox. 

Download the PDF version here

Fresh off the July 4th holiday, news broke that popular social media aggregator Timehop had been breached. Potentially devastating news? Certainly, a breach ranks among every organization’s worst nightmares.

1 2 3 4 5
... 8 >