When You Know Too Much: Protecting Security Data from Security People