This is the second post in the Automating Cyber security series – the first being back in October (I really need to speed this up!). In this post, I would like to simply share a train of thought with you which will lead, I hope, to a rough scope of the problems we face when [...]