"The fact that our most catastrophic breaches came from perfectly authenticated users proves that identity verification solves the wrong problem."
"Audit logs are the security equivalent of an autopsy report. They tell you exactly how you died, but they don't bring you back to life."