Most cybersecurity strategies today have a short-term, reactive focus, putting emphasis on detecting and chasing down the latest vulnerabilities. However, we often forget there is backlog of historic ...