There are two approaches to cybersecurity: the reactive approach, which is implemented after security protocols have failed, and the proactive approach, which can lead you down the proverbial rabbit hole and into an intelligence gathering world that places you on the opposite side of the virtual table from potential attackers of your secured data. This is, at least, how Stephen Coty of Alert Logic presented the options for strategies to attendees of the 17th Cloud Expo this week.