Part of the 2014 cyber security guide to the 10 most disruptive enterprise technologies: http://www.information-age.com/technology/security/123458260/cyber-security-guide-top-10-disruptive-enterprise-technologies