We’re expected to work from anywhere from any device and there are more data and applications on-premises and in the cloud built for collaboration, connected through a myriad of APIs, and with unique configuration stacks that the attack surface will only grow. Organizations must manage the tension between security and productivity. With an “assume breach” mentality, organizations must turn to the concept of measuring and reducing the “blast radius” by ensuring zero trust and useful monitoring of not just the networks, but to the target of cyber attacks: data.