In today’s fast-moving, dynamic digital environment, there is no crystal ball that can tell you the form or target for the next cyber-attack. The IT product development cycle has become so fast and cantered on functionality that security is rarely in focus. Most developers assume that the layers upon which they build provide the necessary security. Unfortunately, the platforms upon which most of these systems have been built are porous, and attackers are actively looking to exploit the holes in these systems at all levels.