We must advance our understanding and catch up to hackers by proclaiming that the security perimeter, as we knew it, no longer exists. When proof of identity is all we need to access our most sensitive, critical data, then the security perimeter is each and every one of us.