For decades, cybersecurity leaders have repeated the mantra: “We must protect data at rest and in motion with good encryption.” […]