Cisco Blogs
Voice Search is currently unavailable
Powered by Google Web Speech API
We didn't hear that. Try again.
When autocomplete results are available use up and down arrows to review and enter to select

red team

August 12, 2020

SECURITY

Intelligence, Modelling and Hunting Through an ATT&CKers Lens

3 min read

Unless you’ve been asleep recently, you’ll probably be aware of MITRE’s ATT&CK framework. This is a game changer for defenders as it maps out the common threats that an enterprise will face. ATT&CK aligns this to protective and detective controls and allows everyone within the enterprise to speak a common language on how attackers might […]

November 10, 2018

SECURITY

War Games: A WOPR of a Security Test (Part 4)

2 min read

These blue team actions should be performed on top of any specific remedial actions that are carried out to resolve specific issues.

November 3, 2018

SECURITY

War Games: A WOPR of a Security Test (Part 3)

12 min read

The Team believes that the likelihood of a successful Internet delivered attack by either a malicious insider or via an external actor is high, given the systemic failures identified in these scenarios.

October 27, 2018

SECURITY

War Games: A WOPR of a Security Test (Part 2)

3 min read

Having defined the scenarios, you can see how these could be linked together in different ways to form comprehensive attack vectors.

October 20, 2018

SECURITY

War Games: A WOPR of a Security Test (Part 1)

3 min read

In what was an interesting change to the usual technical and risk/compliance focused consultancy, the Team carried out a War Games exercise - similar to a "Red Team" engagement.

May 24, 2017

SECURITY

Can Your Organisation Be Breached? Find Out with a Red Team

4 min read

Have you ever wondered about how the everyday information available on your network could compromise your entire organisation? I lead the Cisco Security Advisory Services team in EMEAR.  We recently performed a “Red Team” exercise in which our client set us the objective of attempting to gain access to their client database. For the uninitiated: […]