Cyber Defense Tools: Limitations and Opportunities (Part 1)