CISO Perspectives (public) cover image

Red team blue team operations: around the Hash Table.

CISO Perspectives (public)

00:00

Can a Pen Test Team Find Their Way In?

In the early 19 seventies good guy hackers, white hackers, ethic hackers, started to use their skills against their own systems. These exercises became known as penetration tests. A separate team would attempt to poke holes in the technology deployed to protect the enterprise. The pen testing teams were not trying to mimic known adversaries. They were trying to find unknown open windows and doors or holes in the fences of the deployed security architecture. When found, the organization could decide how to close them and thus reduce their attack surface.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app