Not everything new is shiny. Which recent security policies should you give up? The three pillars of cyber security protection which are identity, privilege and asset management – won’t ever lose importance. They have remained inalterable for the past few decades. However, other IT security suggestions have not been as deep seated, and have instead evolved to reflect changes in the threat landscape, the onset of new technology tools, or updated insights based on better data.