Securing Cyber Space: How Are We Doing