Media coverage

Anatomy of a well-run red-team exercise

Sorry, this post has not been published yet, check again later!

January 23, 2018
Published by:

CSO

While vulnerability assessments and pen tests have their place, red team exercises – and particularly “assume compromise” or “assume breach” exercises – generally provide the most insight into your blue-team’s readiness to face an attack, says Vectra CTO Oliver Tavakoli.

Read publication

Most recent media coverage

Who’s Responsible for Securing IoT Medical Devices?

May 16, 2019

MedTech Intelligence

Read more

Flexa Launches Crypto-Based Payment App

May 14, 2019

E-Commerce Times

Read more

How Medical Device Companies Can Safeguard Vital IP

May 13, 2019

Health IT Outcomes

Read more