Traditionally centered on laptops, workstations, and mobile devices, cybersecurity needs to evolve to cover more controls in order to counter the ever-growing attack surface.
Yet more comprehensive cyberdefence should not come at the price of operational complexity for the operations.