“Everything comes back to Big Data.” This was a network security consultant’s conclusion. He was telling me about an international retailer’s data breach. The retailer had warnings that a breach was imminent. However, those warnings were lost among the millions of ultimately benign but undifferentiated notices of possible attack. What was missing, my friend concluded, was some type of signal …