For years cyber-security assessments have been a one-sided drill. A ‘red team’, consisting of ethical hackers, works within a timeframe to attack part of a network or a certain application. After the fact, the people responsible for the security of said network or application receive a report with findings and recommendations.
‘Now, go and fix this’, said every ethical hacker ever.
To read the full blog, please click the "read more" button.