-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Cybersecurity Blue Team Strategies
By :

Depending on the needs of an organization, the blue team may realize that a regular pen-test may not suffice for the security posture. A dedicated team may need to be set up with the sole purpose of pen-testing every aspect of the organization on a regular basis, if not daily. This helps take the maturity of cyber defense to an entirely different level.
In some cases, an organization’s policy may not allow for an external service provider to be able to pen-test an internal network or system. In this case, once again, setting up an internal, dedicated team, in the form of a red team, may be able to help.
A red team analysis is a goal-based activity that requires taking a broad and complete look at the company from the point of view of a possible threat. This is because the activity is designed to simulate an actual attack. The objective of doing a red teaming study is to demonstrate how real-world attackers could chain vulnerabilities, in order to breach a system...
Change the font size
Change margin width
Change background colour