A Threat Centric Approach to Cybersecurity