A group that defends an enterprise's information systems when mock attackers attack, typically as part of an operational exercise conducted according to rules established and monitored by a neutral group.

Also, a group that conducts operational vulnerability evaluations and recommends mitigation techniques to customers ho need an independent technical review of their cybersecurity posture.

 

Loading conversations.
Similar or Related Terms
Statistics
349
Characters
54
Words
-25.64
Flesch Reading Ease
30.3
Flesch Kincaid Grade