Cybersecurity operations: Pulling back the curtain