First, I do not think there is any silver bullet to solving the technology side of the security equation.
or simply: