A New Approach is Required Attack Continuum Before During After Control Detect Scope Enforce Block Contain Harden Defend Remediate Network Endpoint Mobile Virtual Cloud Point in Time Continuous Security Enterprise Agreement