The Impossible Puzzle of Cybersecurity