In this episode we compare the traditional "perimeter" approach to cybersecurity with the emerging approach the is entered on identity.