Royal Holloway: Purple team playbook – threat modeling for security testing

Cover Image

In this article, take a closer look at how combining the power of blue teams (defenders) and red teams (attackers) to simulate cyber attacks can help prepare your company for responding to criminals attempting to infiltrate the network. By using a 'purple team', you can prepare a threat model to cover the gaps in your defences and create innovative ways to protect the network and save costs

Vendor:
TechTarget ComputerWeekly.com
Posted:
Feb 8, 2021
Published:
Jul 15, 2020
Format:
PDF
Type:
Research Content
Already a Bitpipe member? Log in here

Download this Research Content!