An attacker can piece together a collection of accounts within an organization using public information and compromised data, building a 'daisy chain' to a target. With the upsurge of cloud-based services and web-facing applications, many organizations face a larger attack space for compromise....