An aerospace company called in federal support over concern that it had been hacked, only to learn that “multiple” overlapping adversaries were deeply inside its perimeter – and that government incident responders couldn’t even tell if any proprietary data had been stolen because the client did not clearly define “where their data was centrally located.”*