August 26, 2015
Todd Howe, Linux Systems Engineer Traditionally, specialists in information security divide into two opposing camps — the Red Team and the Blue Team. The Red Team’s role is to simulate barbarians at the gate: probing network defences and acting like attackers in order to expose and report weaknesses. Blue Team is left to pick up…