Application Data Theft Prevention Supply Chain Attacks: When Trusted Software Turns Malicious When Encryption Becomes Irrelevant: The Quantum Warning Sign How ZORB maps to Cyber Essentials controls