As systems undergo innovation, hackers are adapting their methodologies to stay ahead of the curve. With the rise of cloud-based systems, attackers now seek to exploit the massive quantities of data available via Web applications, microservices, and APIs. Traditional persistent infrastructure allows attackers to take a methodical approach, first penetrating the environment, then moving laterally to seek high-value targets. Instead of being updated once or twice each year, application code is now pushed to production upward of 10 to 20 times each day.”]