The days of defending the perimeter are over. Look at what happened to a major retailer in late 2013 as an example. Someone posing as a trusted contractor was able to enter the retailer’s network and do all sorts of damage — to the tune of 40 million compromised customers. This attack occurred because the retailer wasn’t looking at insider threats carefully enough. Indeed, the perimeter has become more and more porous, and network defenses based on this traditional barrier are no longer enough to protect an organization’s business interests and objectives
You can read the post on AT&T Networking Exchange blog here.