Anatomy of a well-run red-team exercise

Sorry, this post has not been published yet, check again later!

January 23, 2018
Published by:

CSO

While vulnerability assessments and pen tests have their place, red team exercises – and particularly “assume compromise” or “assume breach” exercises – generally provide the most insight into your blue-team’s readiness to face an attack, says Vectra CTO Oliver Tavakoli.

Read publication

Most recent media coverage

Cisco Publishes Solutions to SD-WAN and HyperFlex Software Security Vulnerabilities

May 7, 2021

ZDNet

Read more

Get Expert Advice During World Password Day 2021

May 6, 2021

VM Blog

Read more

How to mitigate the threat of Office 365 account takeover

May 6, 2021

ITP.net

Read more