Attacks now bypass traditional controls entirely, exploiting legitimate tools, cloud services and human behaviour, says Ivaan Captieux, security consultant at Galix.