Bishop Fox Blog

A space dedicated to sharing our thoughts on the latest cybersecurity news, trends, and threats

Subscribe

Subscribe to Blog via Email

Popular Posts:

How We Can Stop Email Spoofing

According to our research, 98 percent of the internet is vulnerable to this attack. And here’s how our tool, SpoofCheck, can help us bring a stop to it.

A Guide to Choosing the Right VPN

NOTE: There is no conflict of interest in the following content. The products in this VPN guide were chosen strictly as a result of research. We received no compensation from any of the creators of our recommended VPNs.

We're Humbled; We're Grateful; Thank You

Fresh off the celebration of our 11th-year anniversary, we at Bishop Fox would like to say a big thank you to everyone who helped us arrive where we are now. We are grateful to our clients and humbled by their continued faith in us, and offer our sincere gratitude to them.

The CIA Leak: A Look On the Bright Side...

Unless you have been living under a rock for the past 24 hours, you’ve heard all about the ongoing CIA / WikiLeaks fiasco.  However, you’ve probably missed one positive takeaway that seems to have gone unnoticed by the majority of those following this story – i.e. a closer examination of the leak reveals indicators of strong collaboration and frequent information sharing with other intelligence agencies (e.g. FBI, NSA, etc.), as well as with agencies across the pond (e.g. MI5, GCHQ), other major security contractors (e.g. Raytheon), and even underground dark web sources.

In the News: A BGP Hijacking Technical Post-Mortem

This blog post was authored by Senior Security Analyst Zach Julian; you can connect with him on Twitter here.

Star Wars: I Find Your Lack of Segmentation Disturbing

For a more detailed technical look at network segmentation, read this guide by Cory Johnson.

A Guide to Do-It-Yourself Network Segmentation

You may be interested in exploring the possibilities of network segmentation, but may not be sure what that looks like for your home network or the network of your small business. You don’t have the budget of a large corporation. You can’t afford the resources that they can, but nonetheless, you want to ensure your network is ultimately secure.

Telling the Security Story: An Interview with Josh Koplik

Josh Koplik is the Chief Information Security Officer at IAC, a media and internet holding company with assets including OKCupid, The Daily Beast, and Tinder. He spoke to Vincent Liu about his “security scorecard” system as well as his background and the schism between business and security objectives.

What Security Leaders Can Learn About Decision-Making

Bishop Fox’s Vincent Liu recently chatted with the General Manager of Cyber Security and Privacy at GE Healthcare Richard Seiersen about decision-making, threat intelligence, the Internet of Things, and his new book, “How to Measure Anything in Cybersecurity Risk.”

Game Over, Man! Reversing Video Games to Create an Unbeatable AI Player

The story of how one Bishop Fox researcher’s obsession spawned a ruthless and unbeatable AI player. SmashBot was presented at DEF CON 24 on Aug. 7, 2016.

< 1 ...
2 3 4 5 6
... 8 >