Skip to main content

Posts

Showing posts from March, 2022

Red Teaming 101: the benefits of employing red teaming as a cybersecurity tactic.

Red teaming is a powerful cybersecurity tactic If you were a bank robber, which kind of banks would you rob? Probably not the bank with a 24-hour police presence on its premises. And most certainly not the banks with an army of armed guards, bollards, and security cameras at every entrance. In cybersecurity, we call that vulnerability analysis. It's where we ask ourselves: "If I were a cybercriminal, what would I attack?" The answer to that question is called the attack surface: the sum of all potential vulnerabilities in a system. Red teaming is the practice of using a "fake" attacker to test the security of a business. The attacker will attempt to gain entry into the company's confidential files and databases, using whatever means necessary. The goal of this exercise is to find any weaknesses in their system, which can then be fixed. The Sugar Security Suite uses these methods to determine how easy it would be for someone without authorization to access yo...