How two pioneering cybersecurity legacies continue to redefine cybersecurity for all