A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure ValidationCybersecurity teams should validate exposures similar to how Sherlock Holmes eliminates irrelevant clues to focus on real threats.