The IT security challenge is immense as the global digital attack surface has expanded vastly while attackers are relentless and seek huge rewards. To address this challenge, a diversity of technical and organizational security solutions must be employed, including encryption, steganography, path encoding, trap and honeypot deployment, and constantly questioning security needs and risks from all perspectives. Most importantly, security defenses can never be relaxed as hackers continue getting younger and more capable over time.