Blue team

Posts with this tag bring up system defense teams and their practices, usually in relation to red teams.

Photo by charlesdeluvio on Unsplash

Felipe Ruiz


Recognize the value of this security assessment method

We took as a basis a question from Tribe of Hackers Red Team (2019) aimed at explaining the value of red teaming to those who're reluctant or unaware of it.

Photo by Geran de Klerk on Unsplash

Rafael Alvarez


Five policies to test your organization's security

We want to guide you about some management policies that we suggest you could use to answer with high precision how secure your information is.

Photo by Terry Vlisidis on Unsplash

Felipe Ruiz


Requirements for threat intelligence and red teaming

In this blog post, you will learn about the guidelines that TIBER-EU provides to entities to choose threat intelligence and red teaming providers.

Photo by Immo Wegmann on Unsplash

Felipe Ruiz


An exemplary initiative to evaluate and protect systems

In this post, you will learn about TIBER-EU, an initiative of the European Central Bank that assesses European entities' cyber resilience.

Photo by Jonathan Petersson on Unsplash

Felipe Ruiz


Learning from the red team expert Carlos Perez

This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share content from the interview with Carlos Perez.

Photo by Chase Moyer on Unsplash

Felipe Ruiz


Learning from the red team expert 'Tinker Secor'

This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share content from the interview with Tinker Secor.

Photo by Dorinel Panaite on Unsplash

Felipe Ruiz


Learning from the red team expert Georgia Weidman

This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share content from the interview with Georgia Weidman.

Photo by Manyu Varma on Unsplash

Felipe Ruiz


Learning from the red team expert Benjamin Donnelly

This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share content from the interview with Benjamin Donnelly.

Photo by Lucas Benjamin on Unsplash

Felipe Ruiz


Learning from the Red Team Expert Marcus J. Carey

This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share an introduction and some of the highlights of the first interview.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.