How identity leaders and enterprises can go about covering gaps and fully securing their identity attack surface| softwareanalyst.substack.com