Recently, the Wi-Fi Alliance officially announced details for the WPA3 security standard, which includes a brand-new protocol: the “Enhanced Open” network. While this new technology will represent an improvement to …

Read Story

Download the Bishop Fox Cybersecurity Style Guide (V1.1) H It’s been four months since we released Version 1 of the Style Guide to the public, and the response has been …

Read Story

You’ve Already Heard of testssl.sh; Now, Meet IDontSpeakSSL. What is it? It’s a simple script designed for parsing testssl.sh results. It was created to automate the discovery of bad practices …

Read Story

In this write-up, Security Analyst Chris D. describes the first few months of his job at Bishop Fox. A few years back, I was sitting in at a friend's house …

Read Story

Our newest revision, Version 1.1, is now available: (Version 1.1) How do you pronounce SQL? Should you write denial of service with hyphens? Is it pen testing or pentesting? In …

Read Story

EPISODE ONE: THE CTF AWAKENS Each and every December, some of the best and brightest hackers from around the world travel to Washington D.C. for the NetWars Tournament of Champions …

Read Story

If you've been following our actions on social media lately, you'll notice we did a "12 Days of Security" series of cybersecurity tips for how to stay secure around the …

Read Story

This blog post is the closing chapter in a series about AWS security best practices. Read the first post and second post in this series for context. In cloud environments, policies, …

Read Story

Subscribe by Email