Cyber security red-teaming is a rather new paradigm. A few years ago when we started providing red-team as a service, all references for the term ‘red-team’ yielded results related to military drills. Today, it is much more common practice among security-aware organizations, and many providers offer this service
As often happens with numerous new paradigms, one can find different approaches to and ambiguous meanings for the term. This article tries to put things in order, define the differences between a ‘penetration test’ and a ‘red-team exercise,’ explain the diverse types of ‘red-team,’ and highlight what the main value of each is and when an organization should decide to engage in such an activity.