Shifting perspectives Articles Spotting the Storm Clouds: Identifying Cyber Vulnerabilities Before a Catastrophe Strikes