John, stolen credentials allow attackers to move laterally within the IT environment to steal information and cause damage – all the while looking like a legitimate user. Or a ransomware attack tries to encrypt as many systems as possible to hold the organization hostage. Security teams can limit lateral movement and the blast radius of an attack with network segmentation. Restricting how far the attack can reach helps minimize the amount of damage caused.