Cybersecurity has been identity-centric since the first username and password appeared. During the infancy of personal computers, user identification was considerably simpler. At that time, workplace technology was physically confined to an office and the business network (if one existed). The only people with access were employees and maybe office cleaning staff.
The locked office door separated business assets from the rest of the world, making it the unsung cybersecurity hero in this early era. Today, we can’t rely on deadbolts to do the heavy lifting for enterprise security.