Page 74 - Cyber Defense eMagazine August 2023
P. 74
Although red-teaming only mimics a cyberattack, it can still lead to adverse outcomes. An organization
should identify the hardware, software, intellectual property and sensitive information the red team will
interact with. It should then create backups of everything.
Get the Best Results
While the red team process is generally smooth and secure, organizations should consider their
obligations and goals to ensure they get the best results. The exercise can be incredibly beneficial if they
take additional steps beforehand.
About the Author
Zac Amos is the Features Editor at ReHack, where he covers cybersecurity and
the tech industry. For more of his content, follow him on Twitter or LinkedIn.
Cyber Defense eMagazine – August 2023 Edition 74
Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.