Attackers will invariably breach networks, and when they do, they sometimes gain a foothold for months or years before anyone even realizes. However, there are certain steps that attackers consistently take, and newer technologies can leverage knowledge of those behaviors to aid in detecting incidents more rapidly.