Abstract :
There is a cacophony of calls for cybersecurity automation. The most experienced people are no longer directly solving problems but instead are supervising largely automated processes. More and more, digital devices are tuning out small failures, from attacks and misconfigurations to version mismatches and service disconnects.