Two technologies can help predict and detect the attack methods adversaries might use and for government user intelligence.