Red Teaming — a ninja in checking your cyber defence
About Red Teaming
Red teaming is a method of evaluating the defense of digital infrastructure. It is performed by white hat hackers imitating the possible actions of malefactors. Such companies as Microsoft, IBM, and SAIC together with some governmental institutions perform regular red teaming in order to ensure that their data is safe.
How black hackers can intrude into the system
The first phase of red teaming is focused on collecting information about the target. Generally, they use conventional public tools such as social media networks (Google, LinkedIn, Facebook, etc.). As a result, much can be learned from the open sources. Based on this information the tool for further engagement is built.
Difference between Penetration Testing and Red Teaming
Penetration Testing is aimed to find as many configuration issues as possible in the time allotted to determine the severity of the vulnerability. The goal of the red teaming is NOT to find as many vulnerabilities as possible but to test the company's detection and response capabilities. A red team tries to get in and access sensitive data as quietly as possible.

It doesn't look for multiple vulnerabilities but for those which will help achieve malevolent goals.
Identify physical, hardware, software, and human vulnerabilities.
Fix all identified security weaknesses
Obtain topical information about risks for your company.
Benefits of Red Teaming
Blue Teaming — a frontier guard in covering your cyber flaws
Blue Teaming supposes an analysis of information systems to test security, disclose security flaws, and to ensure all security measures are effective. It is usually referred to as the countermeasure of Red Teaming. The Blue Teaming is in charge of any defensive step.
Difference between Red Teaming and Blue Teaming?
Based on the main goal of the Red Teaming, the Blue Team should notice any attempts to hack the system and oppose the attack. Blue teaming performs hardening techniques on operating systems throughout the organization.
If the Red Team aims to evaluate detection and response capabilities by attacking, the Blue team has to patch any uncovered vulnerability as soon as possible.
What does the Blue Team take care of?
Blue Teaming is responsible for protection of the network perimeter:
Traffic Flow
Packet Filtering
Proxy Firewalls
Intrusion Detection Systems