What is your ‘real’ security posture?

Issue 6 2025 Editor's Choice, Information Security, Infrastructure, AI & Data Analytics

Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by the real deal – cybercriminals. Operating a tick-box system of thinking, believing that ticking compliance frameworks, passing penetration tests, and completing security awareness training annually, does not mean you are safe.


Christo Coetzer

On the contrary, it can also mean you have become the CEO/COO/or CTO, etc., of Never-Never land, nurturing a comforting fantasy. The last thing you want to happen is that, when the bad guys strike – and today they are increasingly sophisticated - you discover catastrophically that your defences are little more than a misconception.

Red teaming

The Only Way to Know If You are Truly Defensible. The disconnect between perceived and actual security posture is precisely why red teaming has emerged as an indispensable component of mature cybersecurity programmes. Unlike traditional security assessments that validate the existence of controls; red teaming reveals whether those controls actually work when facing determined, adaptive adversaries.

Red teaming goes beyond penetration testing. In a nutshell, penetration testing identifies technical vulnerabilities within a defined scope and timeframe, whereas red teaming simulates real-world adversarial campaigns. A red team operates like genuine threat actors, employing social engineering, physical infiltration, supply chain compromise, and advanced persistent threat techniques to achieve specific objectives, whether that is exfiltrating sensitive data, compromising critical systems, or demonstrating the ability to cause operational disruption.

The fundamental difference between the two lies in the approach. Penetration testers announce their presence through scope agreements and rules of engagement, which in turn constrain activities. Red teams, conversely, operate under the radar, testing not only technical controls, but also detection capabilities, incident response procedures, and the human element that so often represents the weakest link in security chains.

Facing the truth about your defences

Most organisations invest heavily in preventive controls, such as firewalls, endpoint protection, identity management systems, and data loss prevention tools. These controls create a sense of security, reinforced by quarterly vulnerability scans showing declining numbers of high-severity findings.

However, prevention-focused security operates on a fundamentally flawed assumption; that you can eliminate all attack vectors. Red teaming exposes this approach as fallacious. Time and again, red team engagements demonstrate that determined adversaries will find ways through even robust preventative controls. They might phish credentials from an employee working remotely on an unsecured home network. They might exploit a zero-day vulnerability in a third-party application that your scanners cannot detect. They may even brazenly walk into your building carrying a USB device and a convincing story.

What red teaming truly tests is not whether you can prevent every attack (which is not possible), but whether you can detect and respond to attacks in progress before they achieve critical objectives. This shift from prevention to detection and response represents the maturation of cybersecurity thinking, acknowledging that breaches are inevitable, while focusing on minimising their impact.

Testing your detection and response capabilities

Your security operations centre claims 24/7 monitoring. Your incident response plan outlines clear escalation procedures. Your threat intelligence feeds provide indicators of compromise, but do these capabilities actually function when faced with sophisticated adversaries using tactics specifically designed to evade detection?

Red teaming answers this question definitively. A skilled red team will employ living-off-the-land techniques, using legitimate system tools and processes to avoid triggering alerts. They will move laterally through your network at a pace that mimics normal user behaviour. They will exfiltrate data in volumes and patterns designed to blend with legitimate business traffic.

When your security operations team fail to detect these activities – which they often do – the resulting report provides invaluable insights. Perhaps your detection rules focus too heavily on known attack patterns, while missing novel techniques. Perhaps your analysts are overwhelmed by alert volumes and miss critical signals. Perhaps gaps in lateral movement detection exist because internal network traffic receives less scrutiny than perimeter activity.

These failures should not be viewed as embarrassing, but rather as an opportunity for improvement. Better to discover these gaps through controlled red team exercises than through incident responses to actual breaches where the consequences are measured in regulatory fines, reputational damage, and operational disruption.

Be sure to check out the second article in this two-part series, where Christo Coetzer will explore the human element of cybersecurity weaknesses in your business. The article is at www.securitysa.com/26131r


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
Service robot technology for residential complexes
Suprema AI & Data Analytics Infrastructure Residential Estate (Industry)
Suprema has signed a three-party memorandum of understanding (MOU) with Hyundai Motor Group Robotics LAB and Hyundai Engineering & Construction (Hyundai E&C) to collaborate on advancing residential complexes through service robot technology.

Read more...
AI projects are failing at alarming rates
AI & Data Analytics Infrastructure
As organisations around the world accelerate their investments in artificial intelligence, digital transformation and data analytics, a growing number of industry experts are warning that many companies are still approaching these initiatives in fundamentally flawed ways.

Read more...
From vibe hacking to flat-pack malware
Information Security AI & Data Analytics
HP issued its latest Threat Insights Report, with strong indications that attackers are using AI to scale and accelerate campaigns, and that many are prioritising cost, effort, and efficiency over quality.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.