The Twitter hack last month demonstrates once again why managing access rights and user identities has become a critical element of cybersecurity. Hackers used stolen credentials to access the social media platform’s internal tools and commandeer the accounts of a virtual Who’s Who of politicians, celebrities and technology magnates.