Breach Detection: Becoming as Agile as The Attackers