Neuromorphic Cyber Security at the Edge (1 of 2)