Cybersecurity, like any other area of technology, is in a state of continuous evolution, marked periodically by step jumps to new standards as requirements outpace current systems. The five generations of mobile networks have used successively larger encryption keys as computing costs have dropped in line with Moore’s Law. Continuation of these trends will now see network security, and cybersecurity practices in general, undergoing fundamental change. Where previously network security architectures revolved around principles of perimeter defense – easily visualized with the image of a walled castle under siege by an invading army – the new architecture requires more complexity. New principles include ‘ZerotTrust’, ‘Never Trust Always Verify’, ‘Least Privilege’, and ‘Micro-Segmentation’. These form the foundations of the new security…