
Red team, blue team operations: a first principle idea.
CISO Perspectives (public)
00:00
The Difference Between Penetration Testers and Red Teamers
In the late 19 xties, in early 19 seventies, eli computer operators were passing around a paper authored by doctor willis ware and others. The study touched off more than a decade of quiet activity by groups of computer scientists working for the government who tried to break into sensitive computers. These were the first penetration testers. In 19 71, the us. Air force contracted james anderson to run tiger teams against their multics operating systems. Bultic was the precursor to eunuchs.
Transcript
Play full episode