Hold up before diving into Under Attack-as-a-Service model

Read the original article on Cyber Security Wizard.