This was originally posted as an Insight from Wolf & Company, P.C. Threat emulation (also referred to as adversary simulation) is an advanced form of testing where the attack tools, techniques, and procedures (TTPs) utilized are based on documented, real-world criminal actions. These tests are best suited for environments and organizations that have the basics covered … Continue reading Threat Emulation vs. Penetration Testing: Understanding the Differences
Tag: Penetration Testing
CIS CSC #20 – Penetration Tests and Red Team Exercises
Part 20 of a 20 part series detailing the CIS Critical Security Controls.
STS Episode #3: DerbyCon IX Recap
Show notes: https://seangoodwin.blog/sts003
Book Review – The Hacker Playbook 3: Practical Guide To Penetration Testing (Red Team Edition)
My review of The Hacker Playbook 3: Practical Guide to Penetration Testing (Red Team Edition).