The Case for Continuous Security Validation