The Icing on the Security Cake