
Cybersecurity operations still focus on the perimeter?
"The simplest cybersecurity operations still focus on the perimeter, watching who tries to gain entry and blocking unauthorized parties."
The solution being to not have a perimeter, all internal communication is done through end-to-end encrypted and authenticated channels, all users are on the outside and communicate through encrypted channels with authentication done with a hardware dongle .. I rest my case ...