What is a Blue Team?

During cyber security testing engagements, blue teams evaluate organizational security environments and defend these environments from red teams. These red teams play the role…

Jiu-Jitsu training and Red/Blue teaming… How are they the same?
September 04, 2018

I am super passionate about Jiu-Jitsu and InfoSec. I have been involved in InfoSec for 18 years, and Jiu-Jitsu for 10. So how am…

What will it take to close the gap between the red team & blue team?
March 29, 2018

And why it’s time to harness the power of purple team automation Modern militaries have been known to galvanize opposing forces during defense-offense exercises…

Blueprints for a Reliable Threat Exposure Program in the Construction and Engineering Industry
Bill Bradley | February 22, 2024

Issue: The construction industry impacts our daily lives and drives trillions of dollars of spending in critical infrastructure, roadways, sporting venues, and other projects….

What is a Red Team?

Red teams are “ethical hackers” who help test an organization’s defenses by identifying vulnerabilities and launching attacks in a controlled environment. Red teams are…

What is a Purple Team?

  In the context of cybersecurity testing, red teams play the role of attackers, and blue teams act as defenders. A purple team falls…

Top Tips for Purple Team Assessment
June 04, 2019

Until recently, organizations have had limited capabilities for assessing the damage that a cyberattack could do to their critical assets. Despite conducting penetration testing…

Logicalis Selects XM Cyber to Power New Purple Team Offering

XM Cyber to Demonstrate HaXM Platform at Infosecurity Europe 2019 LONDON, May 22, 2019 /PRNewswire/ —  XM Cyber, the multi-award-winning breach and attack simulation (BAS) leader, and Logicalis,…

Cyber Purple Teaming

As someone whose eyes cannot distinguish properly between colors, I always shudder at the thought of mixing up red and blue teams during a…

XM Cyber Expands HaXM Automated Purple Team Platform With New Capabilities and Certifications

Enhanced Platform to be Showcased at RSA Conference 2019 HERZLIYA, Israel, Feb. 20, 2019 /PRNewswire/ — XM Cyber, the multi-award-winning breach and attack simulation (BAS)…

Red Team and Penetration Testing for Corporate Security
October 24, 2018

How easy is it for a malicious actor to get into your network? Penetration testing seeks to answer this question. Commonly referred to as…

The 3 Key Ingredients to Getting CTEM Right
Jason Fruge | November 17, 2024

As a CISO with over 25 years of experience across diverse industries, I’ve seen the limitations of traditional vulnerability management firsthand. It’s often a…

1 2 3 9

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.