N2CON TECHNOLOGY

Identity Is the New Perimeter

The threat landscape has fundamentally shifted. AV still matters, but identity protection is where the real battle is fought now.

Ed Brownlee full profile photo
Ed Brownlee CTO | N2CON

The security conversation has flipped in ways most organizations haven’t fully absorbed. We went from “make sure you have AV on your office computer” to proving identity is the core of everything.

This isn’t about antivirus becoming irrelevant. It’s about recognizing where data lives now, how people access it, and what attackers actually target.

The Old Perimeter Is Gone

Ten years ago, security had a physical shape. Your data lived on servers in your office. Your firewall defined the boundary. Your antivirus ran on machines you controlled.

You had visibility. When someone tried to break in, you could see it. Logs were centralized. Access was easy to shut down because everything was behind one door.

We went from locking company data in a file cabinet in a locked room to putting that file cabinet in the center of Times Square on New Year’s Eve. The whole world can try the handle now.

Cloud adoption erased the walls. Data lives in Microsoft 365, Salesforce, AWS—places you don’t control. People work from home, coffee shops, airports. The network perimeter dissolved.

Microsoft’s 2024 Digital Defense Report found that more than 99% of identity attacks use password-based methods—spray, phishing, credential replay. Attackers aren’t breaking in. They’re signing in with valid credentials.

Identity Became the Attack Surface

When your perimeter is gone, identity is what remains. Every login, every API call, every OAuth token represents a potential breach point. The numbers show this clearly:

  • 86% of security leaders express confidence in preventing identity attacks, yet 85% of organizations were affected by ransomware in 2025
  • Phishing is now the leading entry point for ransomware, reported in 35% of attacks (up from 25% the year before)
  • Machine identities outnumber human identities 82 to 1 in modern environments
  • Weak identity hygiene, inconsistent access controls, and excessive permissions account for three of the top four causes of cloud-related breaches

The visibility problem is real. When everything was on-prem, you could see attack attempts in your firewall logs. You could shut down access quickly because there was one door. Now, login attempts come from every country, every device, every IP range. Without the right tools and staff watching 24/7, you’re blind to it.

The confidence gap is dangerous. Most teams think they’re protected because they deployed MFA. But MFA alone doesn’t stop token theft, OAuth abuse, or session hijacking.

What Actually Matters Now

Modern identity protection requires proving multiple things simultaneously:

The user is who they say they are. This means MFA, but also behavioral patterns—login times, locations, typical activities. Anomalies get flagged even with valid credentials.

The device is known and compliant. Is this a managed device? Does it meet security baselines? Is it patched? Unknown devices get restricted access, even with correct passwords.

The context makes sense. Browser fingerprints, user agents, IP reputation, time of day. These signals feed conditional access policies that decide whether to allow, challenge, or block.

The session stays protected. Token theft and session hijacking bypass MFA entirely. Modern defenses monitor for token reuse, impossible travel, and suspicious API activity.

The Zero Trust Shift

Zero Trust isn’t a product you buy. It’s acknowledging the perimeter is gone and designing accordingly:

  • Never trust, always verify—every request, from every user, on every device
  • Least privilege access—grant minimum permissions needed, for minimum time required
  • Assume breach—design detection and response for when credentials are compromised

This means identity and access management becomes your actual security perimeter. Conditional Access policies, device compliance checks, privileged access management—these are your firewalls now.

AV Still Matters (Just Not Enough)

Endpoint protection hasn’t become irrelevant. Malware, ransomware, and fileless attacks still need detection. EDR and XDR platforms provide critical visibility.

But AV operates at the wrong layer if it’s your primary defense. Once attackers have valid credentials, they often don’t need malware. They use legitimate tools—PowerShell, RDP, cloud consoles—to move laterally and exfiltrate data.

The shift is from “block bad files” to “block bad behavior, even from legitimate accounts.”

The Bottom Line

The threat landscape changed because the tools changed. Cloud adoption, remote work, and SaaS platforms moved data beyond physical control. Identity became the only consistent control point.

If your security strategy still centers on perimeter defenses without identity-first controls, you’re protecting a castle that no longer exists.


This note draws on Microsoft’s Digital Defense Report 2024, CyberArk’s 2025 Identity Security Landscape, SpyCloud’s Identity Threat Report 2025, and CSA’s State of Cloud and AI Security 2025.

Ed Brownlee portrait

Ed Brownlee

Ed Brownlee

CTO | N2CON

Ed Brownlee serves as CTO at N2CON, architecting technical solutions across security, disaster recovery, and infrastructure. His approach connects enterprise-grade practices with p…

Connect on LinkedIn