Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    How Maui Is Recovering From the Firestorm of 2023

    One Burning Question For All 30 MLB Teams Ahead Of Spring Training

    Does ICE Need a Warrant to Enter Your Home?

    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest VKontakte
    Sg Latest NewsSg Latest News
    • Home
    • Politics
    • Business
    • Technology
    • Entertainment
    • Health
    • Sports
    Sg Latest NewsSg Latest News
    Home»Technology»Why unifying pen testing and intel beats security silos
    Technology

    Why unifying pen testing and intel beats security silos

    AdminBy AdminNo Comments5 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Ahead of Cyber Security & Cloud Expo, Outpost24 explains why integrating pen testing and threat intel is vital for DevOps.

    Security teams frequently manage pen testing and threat intelligence as distinct, unconnected workstreams. This separation creates a structural weakness that adversaries are increasingly exploiting.

    Headshot of Marcelo Castro Escalada, Senior Product Manager at Outpost24.

    Marcelo Castro Escalada, Senior Product Manager at Outpost24, warns the traditional model is no longer sufficient. For engineering leads and technical architects, the friction between maintaining delivery velocity and enforcing security governance is a constant battle. The standard cadence (build, pause for assessment, patch, release) struggles to keep pace with an adversary landscape that operates continuously.

    “The key blind spot this creates is that organisations assess security in static, point-in-time silos, while modern attackers operate in a continuous, adaptive, and externally-driven way,” says Marcelo.

    Current frameworks typically treat these functions as isolated inputs. Pen testing validates a scoped environment at a specific moment, often lacking real-time context. Threat intelligence offers data on adversary tactics but is rarely translated into concrete testing parameters. Meanwhile, External Attack Surface Management (EASM) identifies internet-facing assets but often lacks the context to validate exploitability.

    These disconnects result in an aggregate view that fails to match the reality of a targeted attack.  Marcelo advocates for integrating these disciplines to shift the security programme from isolated exercises to a continuous exposure management model. In this structure, external assets are prioritised based on active threat intelligence and validated through adversary-aligned testing.

    “This directly addresses the gap between how defenders traditionally operate and how attackers exploit organisations today,” Marcelo notes.

    The governance trap

    For DevOps teams, new security methodologies often signal increased friction such as more gates, manual approvals, and slowed deployment frequency.

     Marcelo argues that tightening control is the wrong instinct. “Enforcing stricter deployment governance is not the solution to accelerating development cycles—that approach reflects an outdated, gate-based security model,” he explains.

    The objective is to embed security capabilities that function at the same velocity as DevOps. “Security should not act as a stopper, but as an embedded capability that operates at the same velocity as DevOps,” Marcelo states.

    This requires integrating security throughout the development lifecycle via a Secure SDLC. By automating controls and continuously validating risk within CI/CD pipelines, teams can reduce remediation costs and ship faster without accumulating hidden debt.

    Synergies between EASM, Pen Testing as a Service (PTaaS), and threat intelligence extend this model beyond in-house development, providing visibility into exposed assets without introducing manual bottlenecks.

    Third-party integration risks

    The attack surface has expanded beyond internal code to include the mesh of services that code connects to. Data from Outpost24 identifies third-party integrations as the most immediate risk to enterprise environments.

    “In many cases observed throughout 2025, the initial access vector was leaked or stolen credentials, but the real impact occurred after access was gained, when threat actors abused poorly monitored third-party integrations to move laterally, escalate privileges, or access sensitive data,” says Marcelo.

    Attackers are combining common techniques – such as credential compromise and trusted integrations – to exploit gaps in governance rather than purely technical vulnerabilities. For engineers, it is important to distinguish between malice and oversight.

    “In most cases, unmonitored assets result from well-intentioned tools or deployments that were simply forgotten, rather than malicious evasion,” Marcelo says. This distinction dictates the response: forgotten assets require better discovery and tooling, whereas malicious evasion demands active threat detection.

    Structuring for collaboration

    Moving to this unified model requires organisational alignment. “Organisations need to align their Threat Intelligence, EASM, and AppSec teams around shared objectives, metrics, and workflows, rather than letting each operate in isolation,” Marcelo advises.

    This often necessitates cross-functional pods or liaison roles to formalise information sharing. Innovating by combining methodologies can introduce complexity, so teams should validate new integrations in limited-scope pilots before broader rollout.

    “Implementing the right process around the tools is as important as the tools you implement,” Marcelo states.

    Effectiveness in this integrated model is measured differently than in siloed compliance checks. Marcelo points to three primary KPIs for maturity:

    • External Exposure Reduction Rate (EERR) tracks how effectively the organisation reduces its real, externally exploitable attack surface.
    • Mean Time to Remediate Exploitable Findings (MTTR-EF) measures the speed at which the organisation closes validated, attacker-relevant weaknesses.
    • Threat Intelligence Actionability Ratio (TIAR) assesses “how much threat intelligence actually drives defensive or preventive action, versus just being consumed passively.”

    “In this model, security scales with delivery speed rather than constraining it, and is rightly treated as a long-term investment in resilience rather than a tax on innovation,” Marcelo concludes.

    Outpost24 is a key sponsor of this year’s Cyber Security & Cloud Expo Global. Hear more directly from the company’s experts, including Marcelo Castro Escalada, during the event in London on 4-5 February 2026. Be sure to check out Marcelo’s day one presentation titled ‘Pulled Pork and Watermelon – How to Leverage Unlikely Synergies in Modern Cybersecurity’ and swing by Outpost24’s booth at stand #75.

    See also: White House rescinds software security compliance mandates

    Banner for Cyber Security Expo by TechEx events.

    Want to learn more about cybersecurity from industry leaders? Check out Cyber Security & Cloud Expo taking place in Amsterdam, California, and London. The comprehensive event is part of TechEx and is co-located with other leading technology events including the AI & Big Data Expo. Click here for more information.

    Developer is powered by TechForge Media. Explore other upcoming enterprise technology events and webinars here.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Admin
    • Website

    Related Posts

    Galaxy S22 Reaches Final Year of Updates With Major Change

    15 Best Noise Canceling Earbuds for 2026 Work Calls

    NASA’s skywatching tips for February include a planetary parade and a moon mission

    History repeats itself in Post Office Capture redress scheme with low-ball offers made

    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Judge reverses Trump administration’s cuts of billions of dollars to Harvard University

    Prabowo jets to meet Xi in China after deadly Indonesia protests

    This HP laptop with an astonishing 32GB of RAM is just $261

    Top Reviews
    9.1

    Review: Mi 10 Mobile with Qualcomm Snapdragon 870 Mobile Platform

    By Admin
    8.9

    Comparison of Mobile Phone Providers: 4G Connectivity & Speed

    By Admin
    8.9

    Which LED Lights for Nail Salon Safe? Comparison of Major Brands

    By Admin
    Sg Latest News
    Facebook X (Twitter) Instagram Pinterest Vimeo YouTube
    • Get In Touch
    © 2026 SglatestNews. All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.