The Challenge of Detecting Threats in the Cloud