Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
      • Practitioner Playlists
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • CIO Summit
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
          • Practitioner Playlists
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » How Regression Testing and Deception Technology Prevent Future Security Incidents
Cybersecurity as a Business Enabler

How Regression Testing and Deception Technology Prevent Future Security Incidents

Chris HughesBy Chris HughesNovember 21, 2022Updated:November 28, 20223 Mins Read
Facebook Twitter LinkedIn Email
regression testing deception technology
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Let’s start with the bad news: You’ve had a security incident, and it’s impacted your organization. There certainly can’t be good news, can there? Not so fast. There’s a silver lining here: While security incidents and data breaches are never desired and can have severe consequences, they’re also opportunities to build on the lessons learned and correct deficiencies. Two ways of doing this are by implementing security regression testing and deception technology.

What Is Security Regression Testing?

Security regression testing is essentially re-validating that something has been remediated and indeed remains remediated. Basic examples include verifying that a patch or secure configuration on a system is still in place. While this may seem counterintuitive, it is actually fairly easy for configuration drift to occur and for systems to return to previously vulnerable states. For example, perhaps a malicious actor took advantage of publicly exposed data storage or utilized default credentials. Organizations can create and automate the use of regression tests to verify that these circumstances do not occur again by using information gained during the incident and resolution.

Organizations have increasingly been making use of security regression testing to mitigate these concerns. One popular example is the use of Nuclei, which allows sending requests to targets across an environment using templates that you create. Given it is an open-source software (OSS) tool, Nuclei also boasts a robust portfolio of community-curated templates that organizations can take and start with.

There’s nothing worse than going through the laborious process of incident response and resolution, only to make yourself vulnerable again to the same or similar attacks by failing to ensure your remediation activities stick (and aren’t reverting to the known vulnerable states that led to the compromise to begin with). Organizations also have an opportunity to contribute to the broader community by sharing the security regression testing and/or templates they create. This empowers others to build on and customize them for their own needs.

Deception Technology

Another area of security that is growing in popularity is deception technology. This is an area of incident response that utilizes decoy assets to entice malicious actors into interacting with them, which then provides security teams data that can be used to detect and defend against threats. It often includes the use of things such as honeypots, honey users, and honey credentials, all aimed at enticing malicious interaction. Deception integration can also address a variety of threats such as credential theft, lateral movement, and accessing sensitive data.

This gets really interesting when organizations pair deception technology with lessons learned from analysis of the techniques, tactics, and procedures (TTP) implemented in recent security incidents. Armed with this information, security teams can specifically design these deception tools and implementations to align with those TTPs. This makes the deception techniques they use align with known malicious activity in their environment, which helps identify further activities by the same or similar malicious actors.

Final Thoughts

By combining both security regression testing and deception technology, organizations can verify the circumstances and configurations that caused the incident to begin with, as well as identify any further ongoing malicious activity using behaviors observed earlier in the incident response process. In the vein of collaboration, which we will touch on deeper in other articles on this topic, the organization can also share this information with other organizations directly or through outlets such as Information Sharing and Analysis Centers (ISACs).

Click here to join the conversation on linkedin

Want more cybersecurity insights? Subscribe to the Cybersecurity as a Business Enabler channel:

Acceleration Economy Cybersecurity

breach Cyber Attack Cybersecurity featured Open-Source Software security technology vulnerability
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CISO & Co-Founder
Aquia

Areas of Expertise
  • Cybersecurity
  • LinkedIn

Chris Hughes is an Acceleration Economy Analyst focusing on Cybersecurity. Chris currently serves as the Co-Founder and CISO of Aquia. Chris has nearly 20 years of IT/Cybersecurity experience. This ranges from active duty time with the U.S. Air Force, a Civil Servant with the U.S. Navy and General Services Administration (GSA)/FedRAMP as well as time as a consultant in the private sector. In addition, he also is an Adjunct Professor for M.S. Cybersecurity programs at Capitol Technology University and University of Maryland Global Campus. Chris also participates in industry Working Groups such as the Cloud Security Alliances Incident Response Working Group and serves as the Membership Chair for Cloud Security Alliance D.C. Chris also co-hosts the Resilient Cyber Podcast. Chris holds various industry certifications such as the CISSP/CCSP from ISC2 as holding both the AWS and Azure security certifications. He regularly consults with IT and Cybersecurity leaders from various industries to assist their organizations with their Cloud migration journeys while keeping Security a core component of that transformation.

  Contact Chris Hughes ...

Related Posts

Workday New Co-CEO Sets the Tone: ‘We’re Great People Who Kick Ass’

March 22, 2023

Why Today’s Leaders Must Understand the Predominance of Native Digitals

March 22, 2023

Why Defining ‘Meaningful Data’ Reduces Cybersecurity Risk

March 22, 2023

How Business Leaders Should Manage Zero Trust as Part of Cybersecurity Strategy

March 22, 2023
Add A Comment

Comments are closed.

Recent Posts
  • Workday New Co-CEO Sets the Tone: ‘We’re Great People Who Kick Ass’
  • Why Today’s Leaders Must Understand the Predominance of Native Digitals
  • Why Defining ‘Meaningful Data’ Reduces Cybersecurity Risk
  • How Business Leaders Should Manage Zero Trust as Part of Cybersecurity Strategy
  • How AI Is Moving Us From the Attention Economy to the Acceleration Economy

  • 3X a week
  • Analyst Videos, Articles & Playlists
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

Securing Software-as-a-Service Applications

March 1, 2023

Retail Innovation With AI, Data, and Cybersecurity

March 1, 2023

Cloud Data Strategy, Analytics, and Governance

February 27, 2023

Cloud Wars Top 10 CEO Priorities

February 8, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.