The security industry perfected protecting one.
The other 144 are on their own.
The attack model changed. Threats arrive as trusted code, running inside your infrastructure. The only question that matters: can the workload reach the attacker's endpoint? That question is answered by Workload-Centric Zero Trust.