How two traditionally disparate security disciplines can be united. Source