For many years, cybersecurity strategy was built around a familiar assumption: attackers were constrained by time, skill, and scale. Even some quick and easy cyber-attacks require specialized expertise, long...