Red Teaming

Cybersecurity Insights with Contrast CISO David Lindner | 04/11/25
David Lindner, Director, Application Security | | Alert Fatigue, cisa, Cloud Security, Cybersecurity, Red Teaming, Threat Intelligence, training
Insight No. 1 — How to survive without CISA As CISA scales back, it’s time for enterprises to wake up to a harsh reality: You can’t rely on the government to secure ...

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows
Tom Eston | | AI, Automation in Security, cyber defense, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, IT Security Collaboration, Managing Cybersecurity Data, Penetration Testing, PlexTrac, Podcast, Podcasts, Privacy, purple teaming, Red Teaming, risk management, risk scoring, security, security best practices, technology, Threat Intelligence, Vulnerability Remediation, Weekly Edition
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover ...

Tackling Data Overload: Strategies for Effective Vulnerability Remediation
Tom Eston | | AI, Automation in Security, cyber defense, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, IT Security Collaboration, Managing Cybersecurity Data, Penetration Testing, PlexTrac, Podcast, Podcasts, Privacy, purple teaming, Red Teaming, risk management, risk scoring, security, security best practices, technology, Threat Intelligence, Vulnerability Remediation, Weekly Edition
In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and ...

Don’t Touch That Object! Finding SACL Tripwires During Red Team Ops
During red team operations, stealth is a critical component. We spend a great deal of time ensuring our payloads will evade any endpoint detection and response (EDR) solution, our traffic is obfuscated ...

What is Red Teaming?
Red teaming is like staging a realistic rehearsal for a potential cyber attack to check an organization’s security resilience before they become actual problems. The exercise has three key phases: getting inside ...
Response to CISA Advisory (AA24-326A): Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization
Ayelen Torello | | adversary emulation, CISA Alert, Critical Infrastructure, cyber resilience, Cybersecurity Advisory (CSA), Red Team Assessment (RTA), Red Teaming
In response to the recently published CISA Advisory (AA24-326A) which highlights the CISA Red Team's simulation of real-world malicious cyber operations, AttackIQ has provided actionable recommendations to help organizations emulate these attacks ...
Red team vs Blue team: A CISO’s Guide to Offensive Security
It’s 3 am. Your phone screams. Hackers are in your system. Panic sets in. But wait! Your Blue Team has been sharpening its skills, thanks to the relentless challenges posed by the ...
Red team vs Blue team: A CISO’s Guide to Offensive Security
It’s 3 am. Your phone screams. Hackers are in your system. Panic sets in. But wait! Your Blue Team has been sharpening its skills, thanks to the relentless challenges posed by the ...

Stepping Into the Attacker’s Shoes: The Strategic Power of Red Teaming (Insights from the Field)
Red Teaming security assessments aim to demonstrate to clients how attackers in the real world might link together various exploits and attack methods to reach their objectives ...
Security Boulevard

Stepping Into the Attacker’s Shoes: The Strategic Power of Red Teaming
Red Teaming exercises bring in a team of reliable experts who can demonstrate what your organization's cybersecurity really looks like. Here’s how they work ...
Security Boulevard