Software for Adversary Simulations and Red Team Operations

Security vulnerabilities are one of the most common problems in cybersecurity today, as they may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. According to the statistics from the Common Vulnerabilities and Exposures list, 12,174 new vulnerabilities were uncovered in 2019—over 13 times as many as were discovered in 1999, when the database first came into existence.

Traditional security operations often mean pitting the red team--which focuses on hacking and penetration testing to uncover weakness--against the more defensive stance of the blue team. With daily news of breaches and attacks, its critical to examine these techniques and see if new or supplemental approaches are needed. Cybersecurity experts will talk about when and how to go purple by merging the best capabilities and outcomes of the red and blue teams.

Are you testing your network for vulnerabilities? A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. Watch for 8 tips to help you get the most out of your penetration testing tool.