Demystifying Cybersecurity Mesh Architecture: A Comprehensive Guide