Anatomy of a well-run red-team exercise

Sorry, this post has not been published yet, check again later!

January 23, 2018
Published by:

CSO

While vulnerability assessments and pen tests have their place, red team exercises – and particularly “assume compromise” or “assume breach” exercises – generally provide the most insight into your blue-team’s readiness to face an attack, says Vectra CTO Oliver Tavakoli.

Read publication

Most recent media coverage

Right place, right time: machine learning in cyber incident response

October 19, 2021

TEISS

Read more

Ransomware's Evolution: 6 Key Trends to Watch

October 18, 2021

Tech Beacon

Read more

Acer confirms new attack on servers

October 18, 2021

Tech Radar Pro

Read more