The perimeter model breaks when your perimeter disappears. Cloud services put resources outside your firewall. Remote workers connect from home networks you don't control. Mobile devices move between trusted and untrusted networks constantly.
Once an attacker breaches the perimeter, they move laterally with little resistance. A compromised laptop gives access to everything on the internal network. The SolarWinds attack showed how attackers exploit this flat trust model to reach high-value targets.