What is your ‘real’ security posture?

Issue 6 2025 Editor's Choice, Information Security, Infrastructure, AI & Data Analytics

Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by the real deal – cybercriminals. Operating a tick-box system of thinking, believing that ticking compliance frameworks, passing penetration tests, and completing security awareness training annually, does not mean you are safe.


Christo Coetzer

On the contrary, it can also mean you have become the CEO/COO/or CTO, etc., of Never-Never land, nurturing a comforting fantasy. The last thing you want to happen is that, when the bad guys strike – and today they are increasingly sophisticated - you discover catastrophically that your defences are little more than a misconception.

Red teaming

The Only Way to Know If You are Truly Defensible. The disconnect between perceived and actual security posture is precisely why red teaming has emerged as an indispensable component of mature cybersecurity programmes. Unlike traditional security assessments that validate the existence of controls; red teaming reveals whether those controls actually work when facing determined, adaptive adversaries.

Red teaming goes beyond penetration testing. In a nutshell, penetration testing identifies technical vulnerabilities within a defined scope and timeframe, whereas red teaming simulates real-world adversarial campaigns. A red team operates like genuine threat actors, employing social engineering, physical infiltration, supply chain compromise, and advanced persistent threat techniques to achieve specific objectives, whether that is exfiltrating sensitive data, compromising critical systems, or demonstrating the ability to cause operational disruption.

The fundamental difference between the two lies in the approach. Penetration testers announce their presence through scope agreements and rules of engagement, which in turn constrain activities. Red teams, conversely, operate under the radar, testing not only technical controls, but also detection capabilities, incident response procedures, and the human element that so often represents the weakest link in security chains.

Facing the truth about your defences

Most organisations invest heavily in preventive controls, such as firewalls, endpoint protection, identity management systems, and data loss prevention tools. These controls create a sense of security, reinforced by quarterly vulnerability scans showing declining numbers of high-severity findings.

However, prevention-focused security operates on a fundamentally flawed assumption; that you can eliminate all attack vectors. Red teaming exposes this approach as fallacious. Time and again, red team engagements demonstrate that determined adversaries will find ways through even robust preventative controls. They might phish credentials from an employee working remotely on an unsecured home network. They might exploit a zero-day vulnerability in a third-party application that your scanners cannot detect. They may even brazenly walk into your building carrying a USB device and a convincing story.

What red teaming truly tests is not whether you can prevent every attack (which is not possible), but whether you can detect and respond to attacks in progress before they achieve critical objectives. This shift from prevention to detection and response represents the maturation of cybersecurity thinking, acknowledging that breaches are inevitable, while focusing on minimising their impact.

Testing your detection and response capabilities

Your security operations centre claims 24/7 monitoring. Your incident response plan outlines clear escalation procedures. Your threat intelligence feeds provide indicators of compromise, but do these capabilities actually function when faced with sophisticated adversaries using tactics specifically designed to evade detection?

Red teaming answers this question definitively. A skilled red team will employ living-off-the-land techniques, using legitimate system tools and processes to avoid triggering alerts. They will move laterally through your network at a pace that mimics normal user behaviour. They will exfiltrate data in volumes and patterns designed to blend with legitimate business traffic.

When your security operations team fail to detect these activities – which they often do – the resulting report provides invaluable insights. Perhaps your detection rules focus too heavily on known attack patterns, while missing novel techniques. Perhaps your analysts are overwhelmed by alert volumes and miss critical signals. Perhaps gaps in lateral movement detection exist because internal network traffic receives less scrutiny than perimeter activity.

These failures should not be viewed as embarrassing, but rather as an opportunity for improvement. Better to discover these gaps through controlled red team exercises than through incident responses to actual breaches where the consequences are measured in regulatory fines, reputational damage, and operational disruption.

Be sure to check out the second article in this two-part series, where Christo Coetzer will explore the human element of cybersecurity weaknesses in your business. The article is at www.securitysa.com/26131r


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.