Simulating cyberattacks in order to reveal the vulnerabilities in a network, business application or AI system. Performed by ethical hackers, red teaming not only looks for network vulnerabilities, but it evaluates an organization's processes and even its people to determine if a phishing approach might work.
Red and Blue Teams
Red and blue teams work together. While the red team develops attacks, the blue team develops defenses and the red team keeps trying to break through. Working in tandem leads to more comprehensive solutions. See
cybersecurity and
ethical hacker.