Cybercrime has evolved. Attackers once hunted for network flaws or brute-forced their way in. Today, they usually just log on. Identity credentials—usernames, passwords, tokens and access rights—are ...