Bad guys are using automation to attack your networks. Why Not Use the Same Techniques To Defend Yourself?