A red teamer is a cybersecurity professional that works to help companies improve IT security frameworks by attacking and undermining those same frameworks, often without notice. The term “red teaming”…
Browsing CategoryPenetration Testing
What is a Pentester, and Can They Prevent Data Breaches?
With the cost of data breaches at an all-time high, organizations are working to proactively identify areas of risk on the network. Using pentesters to conduct penetration (pen) testing is…
Containers, Security, and Risks within Containerized Environments
Applications have historically been deployed and created in a manner reminiscent of classic shopping malls. First, a developer builds the mall, then creates the various stores inside. The stores conform…
Old Habits Die Hard: New Report Finds Businesses Still Introducing Security Risk into Cloud Environments
While cloud computing and its many forms (private, public, hybrid cloud or multi-cloud environments) have become ubiquitous with innovation and growth over the past decade, cybercriminals have closely watched the…
What It Takes to Build the Blue Team of Tomorrow
A good defense takes some testing. Ethical hacking involves pitting two teams together for the sake of strengthening digital security defenses. The red team attempts to bypass digital security barriers.…
Penetration Testing for Cloud-Based Apps: A Step-by-Step Guide
Although cloud providers offer more and more robust security controls, in the end, you’re the one who has to secure your company’s workloads in the cloud. According to the 2019…
Call to Patch: Zero Day Discovered in Enterprise Help Desk Platform
In an age where organizations have established a direct dependence on software to run critical business operations, it’s fundamental that they are evaluating their software development lifecycles and that of…
Breach and Attack Simulation: Hack Yourself to a More Secure Future
Getting breached is the surest way to learn your organization’s cybersecurity vulnerabilities. And that’s why you need to hack yourself before threat actors do. A cyber breach and attack simulation,…
Breach and Attack Simulation: Hack Yourself to a More Secure Future
Getting breached is the surest way to learn your organization’s cybersecurity vulnerabilities. And that’s why you need to hack yourself before threat actors do. A cyber breach and attack simulation,…
When Is an Attack not an Attack? The Story of Red Team Versus Blue Team
Cybersecurity experts fill our days with terminology from warfare, including jargon such as red team versus blue team. The concept of ‘red team’ has its origin in wargaming. The red…