Penetration Testing vs. Red Teaming: A Guide to Cybersecurity Assessments