Success Stories

Our success stories feature real-world security scenarios. You'll discover varied approaches adopted by your peers in partnering with Bishop Fox, and how our cybersecurity services helped organizations, large and small, across an array of industries assess, identify, and minimize risks.

Securing IoTium

Evaluating Security of an Industrial IoT Platform IoTium, a solution designed for the Industrial Internet of Things (IIoT), enlisted Bishop Fox to verify the security of their product offering. 

Securing Boost.Beast

A Non-Traditional Source Code Review Securing the Foundation of Thousands of Web Applications

Zephyr Health

Building a Healthy Security Program. When Zephyr Health needed help keeping sensitive data secure, they turned to us.

Coinbase and HackerOne

Managing Security Through Collaboration By combining the HackerOne platform with Bishop Fox security consultants, Coinbase successfully implemented an effective bug bounty program to improve site security.  

Change Healthcare

Securing a Competitive Advantage As their business expanded, we were there to help Change Healthcare grow and evolve their security posture.


Securing Mobile Security With Bluebox Bluebox needed a vendor to conduct a mobile security assessment of their solution. Bishop Fox established that security was the foundation of their software.