1.5 NETWORK SECURITY IMPLICATIONS
As with any technological advancement, trying to shoehorn new concepts into legacy practices
rarely works as effectively as expected. When we take a step back and look at the multi-cloud/multi-
infrastructure environments most enterprises exist in now, trying to secure new cloud- and service-
based applications with networking concepts born in the 1970s is akin to putting a Lamborghini emblem
on a Yugo and expecting it to perform differently.
In today’s enterprise, new approaches to network security are needed to safeguard the radically new
everything-as-a-service application model. Two promising methods involve non-attribution, which
helps reduce the likelihood that monitored traffic can be traced to the source, and obfuscation which
provides a similar function to avoid the ability of an adversary to gain intelligence by tracking activity,
network traffic, and day-to-day usage.
ABOUT TAG CYBER
TAG C yber is a t r usted cyb e r s e c ur it y r e s earch a n aly s t firm, pr o viding u n bia se d ind u str y i n sight s an d
reco mmendations t o sec ur it y s ol u ti on p rov id e r s and Fo rtu n e 1 00 e n t er pris es . Fo unded i n 2 0 1 6 by D r. Edwa r d
Amo r os o , former S VP / C S O o f A T & T, t h e c o mpa n y b u ck s th e tr e nd o f pay- fo r-play r e s e a r ch b y o f fe rin g
in-dept h Researc h a s a S e r v ic e (RaaS ) , ma r k e t analy s i s , c o n su lti n g, and p e r so nali z ed co n te n t ba se d o n
hundred s of engagem e nts wit h clie n t s and non -client s alik e —all f ro m a fo rm e r practiti o n e r’s p er sp e ctiv e .
ABOUT SECURECO
SecureCo creates the most secure internet connections possible, addressing a critical gap in existing
cyber security solutions. Our patented stealth technology protects networks and transmissions from
interference and disruption, powering resilient data links, secure applications, and end user privacy.
SecureCo offers a next generation replacement or augmentation for legacy VPNs while extending zero
trust principles to data transport, cloaking data exchange, services, and assets to reduce network attack
surface and targetability. Trusted by some of the most demanding cyber security customers in the
world, we deliver high performance, exceptionally secure data transit for military, intelligence, industrial
and commercial applications.