Home SecurityData Breach Catching the ghost in the machine: Adapting threat detection to cloud speed