![](https://zkresearch.com/wp-content/uploads/2023/08/default-long-siliconangle-2.png)
Historically, threat actors would work diligently to hack through next-generation firewalls, endpoint detection systems and other traditional security tools — something that takes significant work and is often for nothing, since perimeter security is excellent today.