Ask people to define “cybersecurity,” and most will describe the reactive phases of the threat life cycle, detecting and remediating active threats. Although these capabilities are essential, this is ...