Cybersecurity sketchnotes with Gavin Ashton: Evolution of the attack surface