To tap into the power of Web-based, wireless, and other emerg??ing technologies, and thus building true ???defense in depth??? we must appreciate the evolution of blended threats from the simple virus of yesteryear to the virulent targeted attacks of 2013.