Organizations that adopt ethical hacking techniques will leverage red team/blue-team exercises to identify
https://ynewsdaily.com/how-restricting-access-resources-improves/
Organizations that practice ethical hacking will use red team/blue group exercises to identify weaknesses before malicious actors can exploit it