Traditional network security focuses on perimeter defenses. Once inside the network perimeter, users are “trusted” and often given broad access to many corporate resources. But threat actors can come from inside or outside the network, and several high-profile cyberattacks in recent…