The traditional approach of fortifying the network perimeter and implicitly trusting anything inside is dangerous.