Media coverage

Anatomy of a well-run red-team exercise

Sorry, this post has not been published yet, check again later!

January 23, 2018
Published by:

CSO

While vulnerability assessments and pen tests have their place, red team exercises – and particularly “assume compromise” or “assume breach” exercises – generally provide the most insight into your blue-team’s readiness to face an attack, says Vectra CTO Oliver Tavakoli.

Read publication

Most recent media coverage

Government to tackle IoT security

November 19, 2019

Information Age

Read more

Government releases first Australian IoT code of practice

November 19, 2019

Which-50

Read more

As government reins in IoT security, recalcitrant mining industry is exposed

November 19, 2019

CSO

Read more