For years, cybersecurity buying followed a simple pattern of finding a gap and adding a tool. The result? Stacks filled with overlapping products,...