Red team blue team operations: around the Hash Table.
Two members of the CyberWire’s hash table of experts,
- Tom Quinn: CISO - T. Rowe Price
- Rick Doten: CISO - Carolina Complete Health
discuss red team blue team operations in the real world.
Resources:
- “2020 Red and Blue Team Survey Reveals Positive Trends,” by Sam Humphries, Exabeam, last visited 13 September 2020.
- “3 Situations That Call for a Red Team,” by Lisa Earle McLeod, Huffington Post, 23 November 2013.
- “Cybersecurity Red Team Versus Blue Team — Main Differences Explained,” by Sara Jelen, SecurityTrails, 7 December 2018.
- “Don't Give Up the Sheep (1953),” by IMDBtv.
- “Guide to Red Team Operations,” by Raj Chandel, Hacking Articles, 5 August 2019.
- “Helpful Red Team Operation Metrics,” by Cedric Owens, Medium, 2 March 2020.
- “Red team,” by Military Wikia.org.
- “Red Team Vs Blue Team Testing for Cybersecurity,” by Zbigniew Banach, Netsparker, 14 November 2019.
- “Red Team: How to Succeed By Thinking Like the Enemy,” by Micah Zenko, Basic Books, 3 November 2015.
- “Red Team: How to Succeed By Thinking Like the Enemy,” by Micah Zenko, Council on Foreign Relations, 1 November 2015.
- “The Difference Between Red, Blue, and Purple Teams,” By Daniel Miesller, 4 April 2020.
- “The History of Penetration Testing,” by Ryan Fahey, Infosec.
- “The importance of red teams,” by Peter Attia, Media, 24 May 2020.
- “Where does red teaming break down?” by David Spark, Allan Alford, and Dan DeCloss, “Defense in Depth” podcast, 3 September 2020.