| Networks are often the result of successive technological layers. As
| organizations take on new business, face new threats, reconsider
| security notions (e.g., insider/outsider), or embrace new security
| paradigms, more security products get deployed, adding complexity and
| increasing
http://www.rsaconference.com/videos/128/state-of-the-hack-one-year-after-the-apt1-report
If 97% of the breaches you find are directly attributable to Chinese
hackers (aka, due to keyboard language settings, C2 IP, etc.) then how
much are you missing?! Boggles the mind. You're telling me you don't