An overview of “next-generation” cyber-security architectures and strategies, why they are needed and how they enhance traditional technologies.