Under the onslaught of the many publicized cyber attacks, there is only one real and successful defensive postures that can be effectively assumed.

The underlying development, deployment, and execution of software must be as nimble and evasive as the very enemy it guards against.