Doing Cybersecurity with Limited Resources