Identity has undergone a remarkable transformation in recent years. Sophisticated multifactor authentication (MFA) methods have emerged, with passkeys becoming the latest technology capable of replacing weak passwords. Identity management systems connect vast networks of devices, systems, and users. Yet, for all the gains, a nagging problem remains. Detecting signals, understanding events, and determining the correct response in real time is remarkably difficult for identity systems. As...