How four real-world truths about cybersecurity shaped our approach to XDR