They lurk in the dark alleys of the Internet; they keep you awake at night; they are relentless and quite successful. They are the agents of cyber crime, cyber espionage, hacktivism and cyber terrorism. They find and share zero-day vulnerabilities; they patiently research your organizations and your employees; they gather and share information; they infiltrate. And then… they strike. So, how could you protect yourself against – and even prevent – their attacks? Perhaps we…