We focus on prevention and reconfiguration, and fix the root problem of a system before an attack. Resilient and Adaptive. By using our approach, data integrity can be maintained and critical business software can become un-hackable, dynamically adjusting and self healing based on adversary behavior.