A key lesson we have learned is that, in cybersecurity, taking control and maintaining control of a system, from an adversary’s viewpoint, is not that easy, actually. To deny its service, to overwhelm it, is much more easy and can be mounted without much risk of retaliation.