Even though we have many options today to protect ourselves against cybercriminals, more than 90% of all attacks start with “help” of an unwary employee. Clicking on a masked link or opening a malicious attachment unwittingly opens the door to a malicious user in an otherwise highly secure organization’s information environment. As such “negligence” companies […]
What’s Red Teaming? Is it a pentest?
Hey, man, what’s Red Teaming? Is it a pentest? The phrase “Red Teaming” has been increasingly mentioned in cybersecurity discussions. It sounds interesting, somewhat mysterious, contemporary, and offers a wide range of possible explanations for what it should actually mean. As I have repeatedly come across different opinions in my discussions with colleagues in the […]