
Identity is the new perimeter. This phrase, like I said, comes up very very often these days. And what we learn is that by acquiring an identity of any security principle, you can bypass many network restrictions um such as getting into a VPN, going through a firewall. So now you can breach the perimeter without even breaching the perimeter. You just need to acquire an identity of this organization.