Royal Holloway: Purple team playbook – threat modeling for security testing
In this article, take a closer look at how combining the power of blue teams (defenders) and red teams (attackers) to simulate cyber attacks can help prepare your company for responding to criminals attempting to infiltrate the network. By using a 'purple team', you can prepare a threat model to cover the gaps in your defences and create innovative ways to protect the network and save costs