Traditional security operations often mean pitting the red team--which focuses on hacking and penetration testing to uncover weakness--against the more defensive stance of the blue team. With daily news of breaches and attacks, its critical to examine these techniques and see if new or supplemental approaches are needed. Cybersecurity experts will talk about when and how to go purple by merging the best capabilities and outcomes of the red and blue teams.
Software for Adversary Simulations and Red Team Operations
Are you testing your network for vulnerabilities? A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. Watch for 8 tips to help you get the most out of your penetration testing tool.
During hardware-oriented engagements, we are sometimes faced with a hardware device's firmware image. This may happen because we downloaded a firmware upgrade image to try to understand a device with a view of finding security flaws...
Get the Most Out of Your Red Team
Red Team Basics
The SANS definition of a Red Team is, “a process designed to detect network and system vulnerabilities and test security by taking an attacker-like approach to system/network/data access.”
Pagination
- Previous page
- Page 11
- Next page