This document discusses a new approach to cybersecurity as perimeter security becomes less effective. It summarizes that:
1) While security investments are increasing, the costs of breaches are rising faster.
2) The document proposes integrating cyber hygiene practices like patching and encryption across secure infrastructure, devices, networks, and storage to reduce the attack surface and build situational awareness.
3) It also suggests rationalizing the crowded cybersecurity solution ecosystem and using the hypervisor to enforce the intended secure state of workloads through learning, locking, and adapting techniques.