We need technologies that detect breaches inside valid, authorised activity, where others are failing.