Security is more than just a technical challenge.

More than just technical skills are required to address it. 

Welcome to the daily grind

You scan your morning news feed. As usual, it’s a random bag of breaches, tips, and trivia. You jot some notes, and assign an overworked analyst to research a couple of the more worrisome items. You’ll forget most of it by your staff scrum, but that persistent sense of unease will stay with you all day.

If only you could get ahead of the one-off skirmishes . . . if only you could anticipate and forestall the adversaries—known and unknown—who constantly menace your systems.

What more can you do?

You’ve done everything you should. Your auditing and compliance programs are up and running. Your pentesting team regularly probes your information systems. You’ve hired an excellent threat intelligence service. Your red team analyzed your headquarter’s access control systems and procedures just last week.

Yet still you fret. Just last week, your buddy, the CSO at [redacted], suffered an unexpected security failure and will soon be looking for a new job. Will you be next?

20 years in the making

Over 20 years ago, two concerns troubled our founder, Mark Mateski: first, most adversaries deserved more respect than they received; and second, most defenders underestimated the complexity, reliability, and exposure of their own systems.

He launched Red Team Journal with the goal of addressing these concerns. A nascent community of red teamers responded.

Highly regarded

In 2015, Red Team: How to Succeed by Thinking Like the Enemy, the first major book on red teaming, acknowledged Mark’s contribution. Author Micah Zenko noted that Mark “has done more to honestly evaluate and responsibly promote red teaming than anyone,” while Red Team Journal “still serves as the best open-source repository for helpful hints and emerging practices in the field.”

Today, Reciprocal Strategies brings to clients the insights and tools that fueled RTJ and inspired a generation of red teamers. Of particular importance are the strategies of

  • Seeing the whole system (all aspects, not just cyber);
  • Understanding your adversaries; and
  • Exploring the deeply held assumptions that “boot up” before you even begin your security workday.


True to our heritage

We’ve distilled over 20 years of red teaming, wargaming, and security experience into what we call Systems-Aware Red Teaming (SysART). It’s designed to help you apply a systems view and adversarial perspective to your security challenges. And don’t worry; we’ve harnessed the same trailblazing mindset that has made Red Team Journal so trusted, acclaimed, and innovative.


Intrigued? Contact us today for a free consultation.



Your Move