Anyone have any opinions on this?
Ari (@[email protected])
Hey Mastodonians, I have a question for the infosec crowd. Please boost so we can get some reliable metrics. Is red teaming a simulation of a threat actor or a an emulation of one? Does it matter or is it just pedantic semantics? Please discuss with your input and opinion as well as justification. [ ] Red teaming is a simulation [ ] Red teaming is an emulation
