Once upon a time the limits of security were based on a reactive approach, relying heavily on signature-based methodologies, the industry would react to the latest and greatest threats out there to ...