From attacker to defender: Shifting the cyber advantage