Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical Security

How Should Effective AI Red Teams Operate?

By Jordyn Alger, Managing Editor
5 Minutes with Garraghan
Bio image courtesy of Garraghan
April 23, 2026

As artificial intelligence (AI) is increasingly woven into daily work functions and its capabilities grow, it becomes more important that the interactivity, workflows, and decision pathways of these models are tested and understood. Otherwise, organizations could find themselves exposed through their own AI tools. 

This is where the value of AI-specific red teaming comes in. But how can organizations implement this effectively? 

To learn more, Security magazine spoke with Dr. Peter Garraghan, CEO and CTO of Mindgard, Professor in Computer Science at Lancaster University, and fellow of the UK Engineering Physical Sciences and Research Council (EPSRC). 

Security magazine: Tell us about your background and career.

Garraghan: I began my career focusing on distributed systems, cloud infrastructure, and systems security. My academic work as a Chair Professor at Lancaster University has centered on creating and building computing infrastructure of the future. Over time, it became clear that artificial intelligence — and more specifically deep neural networks — was introducing a new class of security problem, one that did not fit neatly into traditional security frameworks.

Around the mid-2010s, as deep neural networks began to outperform other types of machine learning in complex tasks and the introduction of the transform architecture (that presently underpins modern LLMs and agents), I saw a widening gap between AI capability and AI risk. Organizations were deploying models into critical workflows without robust ways to test how those systems behaved under adversarial manipulation. That realization led me to found Mindgard as a research-driven effort to bring attacker-aligned testing methodologies to AI systems. The intent was not to promote fear around AI, but to ensure that as these systems became embedded in enterprise decision-making, they were subjected to the same scientific rigor and adversarial scrutiny that we expect in other high-risk domains.

Security: How is red teaming different from AI-specific red teaming?

Garraghan: Red teaming is the structured simulation by an adversary to test how an organization withstands challenges. It is not limited to technical systems. A red team may probe strategy, governance, operational processes, physical security, insider risk, or technology controls. The purpose is to think and act like a real attacker to expose blind spots, flawed assumptions, and systemic weaknesses before a genuine adversary does.

AI-specific red teaming applies that adversarial discipline to intrinsically probabilistic systems whose behavior is shaped by data and language. Unlike conventional systems, AI models can be influenced through phrasing, context manipulation, data sources, or tool integrations. Risk often emerges from how models interact with workflows and users rather than from a single technical flaw. As a result, AI red teaming must evaluate behavior and decision pathways over time, particularly as these systems become embedded in business-critical operations.

Security: Why is this an important distinction to make?

Garraghan: Many organizations underestimate AI risk by applying legacy testing assumptions. Asking a model a series of harmful questions and observing refusals is not equivalent to red teaming. It does not reflect how real adversaries operate, nor does it account for indirect or multi-step exploitation.

Security: How should effective AI red teams operate?

Garraghan: Start with adversary emulation; model intent, persistence, and economic motivation, rather than simply testing edge cases. AI systems are interactive, so testing should reflect iterative probing and escalation. A single prompt rarely reveals systemic weaknesses; exploitation often emerges across multiple steps.

Equally important is scope. The model alone is rarely the sole point of failure. Red teams must assess orchestration layers, retrieval mechanisms, external data sources, access controls, and downstream actions. Automation can help scale adversarial testing across thousands of variants, but human expertise remains critical to interpret emergent behavior and design novel attack paths. Finally, results must be measurable and mapped to impact. AI red teaming should produce evidence that informs governance and remediation, not anecdotal observations that lack operational relevance.

Security: Is there anything we haven’t discussed that you’d like to add?

Garraghan: I would emphasize that AI security is about disciplined risk management, not eliminating every possible failure, and that it is a rapidly evolving space both on the scientific and technological front. These systems are probabilistic by design, so the goal is to understand how they fail and to keep those failures within acceptable bounds. We are also entering an era where language acts as a control surface. In AI systems, natural language can directly shape behavior, and as autonomous agents gain access to data and actions, behavioral manipulation shifts from content risk to operational risk. That change requires the same rigor and governance we apply to any security-critical system.

KEYWORDS: 5 minutes with artificial intelligence (AI) Artificial Intelligence (AI) Security red team testing red teaming

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Digital human mind

    Should Organizations Block AI Browsers? Security Leaders Discuss

    See More
  • 5 Minutes with Bhavsar

    How Critical Infrastructure Is Becoming the First AI Trust Battleground

    See More
  • Four men putting together puzzle pieces

    How to build an effective security team

    See More

Related Products

See More Products
  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

See More Products

Events

View AllSubmit An Event
  • April 15, 2026

    How AI is Closing the Decision Gap in Leading GSOCs

    ON DEMAND: Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing