This paper takes a look at how we arrived at the cyber threat impasse we find ourselves in today. It describes how the tsunami of big data has become like a carrot to a donkey, inviting cybercriminals to feed on it. And, how our technological innovations are being used against us to power new types of hackers, including those who are not just in it for financial gain. The paper also presents a holistic approach to new technologies (machine learning, open source data processing, automation) that leads towards an integrated model of cybersecurity.