Identity has become the easiest path for attackers to breach an organization. Modern threat reports keep repeating the same message: threat actors are no longer focused on breaking in through technical exploits. They are logging in with valid credenti…