After the first article, which covered "Extending the scope of detection to new perimeters" (available here), this second installment is the next in our summer series about the SOC... Enhancing detection with new approaches Think identity to detect suspect…