Red, White and Blue Make Purple

Vulnerability scanning, penetration testing and red teams are the main detective controls for residual cyber risk – i.e. the risk that remains given controls already in place. Vulnerability scanning and penetration testers find potential cyber weaknesses, while red teams map those weaknesses to business risk for existing applications and devices.    Blue teams make up […]