Tools & TutorialsMEDIUM

Security Tools - Measuring Performance in Real-Time Explained

HNHelp Net Security
digiDationsATLASMITRE ATT&CKAICISO
🎯

Basically, organizations need to check their security all the time, not just every few months.

Quick Summary

Organizations need to rethink how they measure security performance. Tim Nan from digiDations highlights the risks of outdated methods. Continuous validation is essential for effective defense.

What Happened

In today's fast-paced cyber landscape, organizations are realizing that security performance cannot be evaluated just once a quarter. Tim Nan, CEO of digiDations, highlights a critical misconception: more security tools do not necessarily equate to better protection. Adversaries only need one successful entry point to exploit vulnerabilities. This means that relying on periodic assessments can leave organizations exposed to attacks that exploit gaps in their defenses.

The urgency for continuous validation has intensified due to two main factors: the speed of attackers and the volume of vulnerabilities. According to the CrowdStrike 2026 Global Threat Report, the median time for adversaries to move laterally after gaining access has drastically decreased from 98 minutes in 2021 to just 29 minutes in 2025. This rapid evolution in attack methods makes it imperative for organizations to keep pace with their defenses.

Who's Being Targeted

Organizations across various sectors are vulnerable to these evolving threats. As the number of new vulnerabilities continues to rise—over 160 new CVEs projected daily—manual testing methods are becoming inadequate. Relying on periodic testing provides only a snapshot of security performance, which can quickly become outdated as both the threat landscape and organizational environments change.

Nan emphasizes that security leaders must shift their focus from merely asking, "Did we detect this?" to a more proactive approach: "Did we detect and respond quickly enough?" This change in mindset is crucial for ensuring that organizations can effectively thwart real attacks before they cause damage.

The Shift to Continuous Validation

To address these challenges, digiDations has developed the ATLAS platform, which conducts continuous adversary simulations based on the MITRE ATT&CK framework. This platform measures control effectiveness and identifies detection gaps in real-time. With a library that encompasses over 24,000 tactics and techniques, ATLAS provides a comprehensive view of an organization's security posture.

The continuous validation process not only tests defenses but also serves as a training ground for Security Operations Center (SOC) teams. By simulating attacks, teams gain valuable experience in recognizing threat patterns and responding effectively. This iterative learning process helps refine response strategies and enhances overall security resilience.

How to Protect Your Security

For organizations still relying on traditional assessment methods, Nan recommends a proactive approach. Implement ongoing, controlled attack simulations to measure how well your security controls and teams perform against real-world scenarios. This shift from reactive to proactive defense allows organizations to build confidence in their security measures.

In a world where attackers are increasingly using AI to enhance their strategies, defenders must also leverage AI for detection and response. The gap between attacker and defender capabilities hinges on which side can adapt more rapidly. Continuous validation that incorporates AI-driven simulations will ensure organizations are prepared for the latest threats.

In conclusion, organizations must stop asking if they think they are secure and start proving their defenses work in real-time. By adopting continuous validation practices, they can better protect themselves against evolving cyber threats.

🔒 Pro insight: Continuous validation is crucial as attacker tactics evolve rapidly; organizations must adapt their defenses in real-time to mitigate risks effectively.

Original article from

Help Net Security · Mirko Zorz

Read Full Article

Related Pings

MEDIUMTools & Tutorials

Tools - Hadrian Launches Nova for AI-Powered Pentesting

Hadrian has launched Nova, an innovative AI-powered pentesting tool. This solution enables organizations to conduct continuous security assessments. By automating testing, teams can respond faster to threats, ensuring robust defenses.

Help Net Security·
MEDIUMTools & Tutorials

NAKIVO Backup & Replication - New Features in v11.2 Launched

NAKIVO has launched Backup & Replication v11.2, enhancing data protection features. Organizations can now benefit from faster disaster recovery and improved security. This update is crucial for businesses relying on reliable backup solutions.

Cyber Security News·
LOWTools & Tutorials

Endpoint Patching - Action1's Cross-Platform Solution Explained

Action1 simplifies endpoint patching across Windows, macOS, and Linux. This cloud-based platform makes IT operations more efficient and risk-aware. With a free tier for up to 200 endpoints, it’s accessible for all organizations.

Help Net Security·
LOWTools & Tutorials

ISC Stormcast - Latest Updates from March 24, 2026

The latest ISC Stormcast episode is out! Tune in for the latest cybersecurity updates and insights. Stay ahead of threats and enhance your security knowledge. Don't miss out on this valuable resource!

SANS ISC Full Text·
MEDIUMTools & Tutorials

Zero Trust - Moving From Strategy Decks to Real Security

Rohan Ravindranath reveals why many Zero Trust strategies fail. He shares insights on overcoming common pitfalls and achieving real security in enterprises. Don't let your security strategy remain just a concept.

SC Media·
LOWTools & Tutorials

Tool Updates - Security and Logic Fixes Explained

Recent updates revealed security and logic flaws in Python scripts. The developer used Claude to identify and fix these mistakes. Regular code reviews are crucial for maintaining secure coding practices.

SANS ISC·