As the saying goes, keep your friends close and your cyber enemies closer.
Threat intelligence programs help security teams know the enemy by providing information on the evolving threat landscape and deception technology.
Continuous security validation lets security teams know their enemy better by simulating common attacks to find weaknesses. Protections can be optimized, and risk mitigation efforts can be better prioritized.
This paper, intended for security, risk, and compliance managers, will describe the benefits of integrating security intelligence with security validation and the value of extending automated testing coverage to the MITRE pre-attack phase; the reconnaissance a threat actor performs before launching an attack.