Foxes, Henhouses, and Cybersecurity