Security leaders remain concerned about data breaches, and rightfully so. Cybersecurity Ventures projects that the global cost of cybercrime will increase to $10.5 trillion annually in 2025—a 15% increase from the prior year.  

Modern security operations hinge on a disciplined incident response program that can spot attack vectors early, shrink your attack surface, and neutralize malicious actors before they pivot deeper into the network. By aligning threat intel with proactive vulnerability scanning and continuous access management, organizations cut mean-time-to-detect (MTTD) and stay ahead of ever-evolving cyber attacks. Mature response capabilities depend on tuned threat detection and practiced incident response capabilities across the security system and IT infrastructure.

 

Advanced persistent threats (APTs): Why they’re different

Unlike smash-and-grab intrusions, an advanced persistent threat establishes covert command-and-control, moves laterally, and quietly exfiltrates data over weeks or months. Effective vulnerability management combined with rich attack-path mapping is essential to disrupt APT kill chains.

Given this escalating threat landscape, software security teams rely on various proactive security approaches, such as penetration testing or red teaming, to understand real-world vulnerabilities and their exploitability. Many of the most risk-sensitive organizations utilize both to continually understand vulnerabilities and test their defenses. In this blog post, we will walk through both approaches to help you better leverage them to improve your security posture.

Penetration testing (or pen testing) is a security assessment method in which an organization hires or engages human testers to examine its systems for vulnerabilities against a predetermined methodology, usually for complying with an internal or external control (e.g., PCI-DSS). In a formal penetration test, experienced penetration testers (often ethical hackers) probe priority assets to uncover security vulnerabilities across applications, APIs, and IT infrastructure. These tests are scoped to target specific assets, such as APIs, network infrastructure, web applications, LLM applications, or hardware.

The pen testing engagement process

The pen testing team engagement is broken down into the following stages: 

  • Scope alignment—The pen testing team aligns with the hiring organization on the objectives and scope of the test, including the assets to be tested and the testing methodologies to be used. Teams also agree on digital crown jewels—systems and data whose compromise would cause outsized impact.
  • Vulnerability identification—The testing team analyzes the scope targets using the agreed-upon methodology to identify vulnerabilities, their potential impact, and their likelihood of exploitation. Typical web application attacks include SQL injections and input-validation bypasses; testers also use adversarial tactics to expose application weaknesses that scanners miss.
  • Reporting—The testing results are detailed in a final report that lists all the uncovered vulnerabilities and remediation advice to fix the vulnerability.

 

Benefits and use cases

Pen testing functions as a targeted cybersecurity assessment aligned to security frameworks, confirming that controls prevent known security vulnerabilities from reaching production. Pen testing has become a standard security practice across industries, with surveys showing that 74% of organizations use it as part of their security strategy. Here’s why organizations invest in pen testing: 

  • CoveragePen tests deliver confidence that an asset has been tested for specific vulnerabilities at a point in time, a common internal and in some cases, regulatory requirement.
  • Cost-effectiveFor organizations with lower-risk assets but some compliance overhead, pen testing is often a cost-effective way to meet these requirements without stretching their budget.

Common focus areas in a penetration test: Web application attacks, internal network vulnerabilities, and network exploitation attempts against misconfigured security components—all within the agreed scope.

These advantages make pen testing valuable for several use cases:

  • Meeting compliance requirements—Organizations use pen testing to meet internal or regulatory standards. For instance, the Payment Card Industry Data Security Standard (PCI-DSS 11.3) requires that human-powered pen testing be done at least annually to complement automated vulnerability assessments.
  • Providing stakeholder reassurance—Before partnering with an organization, stakeholders, such as customers, suppliers, investors, and regulators, want reassurance about its security best practices. Through penetration testing, organizations can prove their commitment to meeting a baseline security threshold.
  • Filling testing coverage gaps—Organizations can use pen testing to complement automated scanning and other routine security measures.

 

An overview of red team engagements

In a red team engagement, an organization tasks a group of security professionals (i.e., the “Red Team”) to carry out a simulated attack against the company’s technology, people, and processes. A red teaming exercise takes an adversarial approach, applying attacker tradecraft against people, process, and technology to validate real-world exposure. Think of it as an advanced exercise that simulates, but doesn’t replicate, what threat actors can do to your system. These engagements usually span anywhere from 2-4 weeks (for targeted red-team assessments) to 1.5-6 months (for full-scale assessments), ultimately decided by the client and Red Team.

The work of the Red Team is often countered by a “Blue Team,” which defends and protects the organization, including from attacks by the Red Team. The Blue Team could consist of a single analyst who examines logs, a full-fledged security operations center, or a combination of human analysts and security tools like Endpoint Detection and Response (EDR). Note that in traditional red team operations, the Red and Blue Teams don’t communicate. Instead, the Red Team communicates with a control group, typically consisting of security leaders and/or regulators. 

Organizations that want to foster more collaboration between Red and Blue Teams and minimize friction often adopt a Purple Teaming model, a variation of the Red Team exercise emphasizing transparency and shared learning. In this approach, a Purple Team bridges the gap between the teams by facilitating knowledge sharing and collaboration with the teams to improve offensive and defensive capabilities. 

 

The red team assessment process

When an organization hires a Red Team, the process is usually broken into the following phases:

  • Planning: Before launching any attacks, the Red Team works with the control group to establish clear objectives, boundaries, and success criteria. This ensures the engagement provides maximum value while maintaining operational safety.
  • Threat modeling: The control group shares relevant information with the Red Team or Threat Intelligence Provider (another entity that delivers personalized and sector-specific threat intelligence), such as concerns about specific assets or particular attacker profiles. This can then be used to model what kinds of attacks would be performed against the organization.
  • Threat intelligence (or reconnaissance): The Red Team or Threat Intelligence Provider gathers information on the company’s people and technologies by leveraging tools like LinkedIn, the dark web, public search engines, GitHub repositories, and Shodan. Recon frequently seeds spear phishing and credential-harvesting campaigns to establish initial access.
  • Strategy development: Using the above data, the Red Team or Threat Intelligence Provider identifies potential scenarios or tactics, techniques, and procedures (TTPs) relevant to an organization. For example, to gain remote access to an endpoint, they might write custom malicious tooling, develop social engineering pretexts, and build email lists for password spraying. Selected TTPs are designed to surface gaps in security culture while pressure-testing response capabilities across teams and tooling.
  • Execution and reporting: The Red Team carries out its planned operations and documents its activities, successes, and failures for the control group. Progress is reviewed at intervals throughout the engagement, but the Red Team holds a final debrief with key stakeholders at the end of the project. Outcomes include measurable effects on threat detection and incident response capabilities (e.g., dwell time, escalation path, containment time).

 

Benefits and use cases

As an offensive cybersecurity discipline, red teaming delivers end-to-end cybersecurity testing against realistic adversaries and business processes. Red team engagements (including variations like Purple Teams) offer several advantages in driving security outcomes: 

  • Detect novel attack paths—Red Teams surpass traditional security testing by simulating real-world attacks by chaining together many smaller vulnerabilities, misconfigurations, and pre-authorized business tools (i.e., remote access software, internal scripts, etc.). By using the same applications employees legitimately use, Red Teams can avoid detection while achieving their objectives. This comprehensive testing technique ensures organizations understand their security profile based on the perspective of actual attackers, which is a critical step in reducing risk. A layered incident response workflow—trigger → triage → contain → eradicate succeeds when it sees every vector: credential stuffing, phishing, rogue OAuth consent, and other social engineering attacks that bypass perimeter defenses.
  • Focus security investment—Red teaming can help organizations better estimate the impact of potential breaches, enabling them to make data-driven decisions about their security strategies and maximize the ROI of their security investments. 

These advantages make red teaming a clear choice for many use cases: 

  • Benchmark your organization’s security profile—Red teaming helps security leaders understand the weaknesses of their current security controls and how potential attackers might exploit them. These exercises also reveal what’s working well in your security setup, building confidence in existing measures. 
  • Satisfy due diligence requirements—If you’re going through M&A, a VC firm or the potential acquirer might want to conduct an in-depth exercise (beyond traditional pen testing) in cooperation with you to understand your organization’s security risk. Similarly, customers and other vendors might ask for similar tests.
  • Meet specialized compliance requirements—Compliance regulations like CBEST or Threat Intelligence-based Ethical Read Teaming (TIBER) require organizations to test their security through real-world simulations of attacks. Red team exercises allow organizations to meet these requirements.

 

Traditional pen tests Red team engagements
Goal Tests specific assets for common vulnerabilities Simulate a real-world attack against an organization’s technologies, people, and processes
Scope Defined systems (e.g., LLMs, IoT, cloud setup, and APIs) Focused on technology, people, and processes, but can expand beyond (i.e., data, third-parties, physical security, etc.)
Length 3–14 days 2-4 weeks (for targeted assessment) and 1.5-6 months (for full assessments)
Testing technique  Human-driven assessment against a checklist of known vulnerabilities TTPs of potential threat actors (includes hacking techniques like social engineering, technical exploits, exfiltration methods, procedural pathways, etc.)
Benefits
  • Industry standard (especially for meeting compliance requirements)
  • Cost-effective
  • Clear scope
  • Fill testing coverage gaps
  • Reduce security risk
  • Identify novel attack paths
  • Benchmark an organization’s security profile
  • Meet specialized compliance and/or due diligence requirements

A comparison between traditional pen tests and red team engagements.

 

Choosing the right approach for your program

Use pen testing to check control effectiveness against security frameworks and to validate fixes; use red teaming when you need to model attacker paths to your crown jewels and harden team response capabilities.

Companies can elevate their security maturity by combining penetration testing with red team engagements, taking advantage of what each approach does best. Pen testing meets key compliance requirements while ensuring the systematic examination of critical systems for potential vulnerabilities before attackers exploit them. Red teaming complement this by stress testing the effectiveness of existing security controls by simulating adversarial attacks on an organization’s people, technology, and processes. As real-world case studies in our Ultimate Guide to Offensive Security demonstrate, organizations utilize these approaches to accurately calculate the cost of security gaps, resulting in more informed security roadmaps. 

An analogy might be helpful here—think of securing your organization like protecting a bank vault. A basic security audit checks for obvious flaws in critical parts of the overall building (like an unlocked window). This is similar to pen testing, where testers check key assets against a list of common exploits. However, sophisticated thieves might use other methods, like tricking an employee into giving up crucial information or exploiting a vulnerability in the building’s HVAC system. This mirrors how malicious actors work, which is why organizations use red teaming to test their defenses. Combining these approaches enables organizations (including banks) to protect themselves against common and deep-rooted vulnerabilities. 

As organizations mature, they must go beyond the basics to actually safeguard their systems. Combining pen testing and red teaming addresses both common vulnerabilities and sophisticated attack scenarios, resulting in a more comprehensive security approach. Organizations that embrace this holistic testing approach go beyond just checking boxes—they turn security into a competitive advantage. Together, these approaches protect crown jewels, sharpen threat detection, and coordinate defenses across critical security components—whether delivered by internal teams or partner-led cybersecurity solutions.