Re: Still vulnerable
"Organisations can control root access to all devices. The big problem is an undetected cybernetic intrusion, lasting for years if properly executed."
Most hacks rely on social engineering at the top of the kill chain; that's usually how the cybernetic intrusion happens in the first place.
Also, I wouldn't overstate the ability of any corporation of significant size to control Root. The moment your IT department is big enough to include senior staff with non-techy backgrounds, you might as well publish the domain admin password in the local paper.