We don’t just find vulnerabilities, we also identify the existing Paths to Compromise.