5 4 “I knew something fundamental had changed when my 70+ year-old mother told me she needed more bandwidth,” said Parente. “There’s some irony in the government’s reluctance to move to IP networking, because DARPA first developed the TCP/IP protocols. That unleashed the Internet, yet IP networks can be made private and highly secure, unlike the World Wide Web.” As networking technology has advanced greatly over the past decade, so too has security. With legacy networks, the emphasis was on perimeter security, building a “moat” around your “castle” for keeping the bad actors out. As so many recent breaches have shown, perimeter defense alone is completely insufficient in the face of modern cyber threats. There is no set perimeter any longer. Virtualization allows for the separation of workloads, which can be secured independently and quickly spun up and torn down as needed. As a global network provider, AT&T has unique visibility into new and evolving security threats. Cyber criminals and rogue nation states are constantly conducting cyber reconnaissance and beta testing for vulnerabilities. On average, AT&T sees more than 80 billion potential vulnerability probes across their global IP network every day. The network of the future exists today, and the DoD can utilize these proven capabilities and scale. In many ways, this transformation aligns with the more than 80 year history of AT&T supporting the military. In World War II telephone operators were poised, day or night, ready to report if enemy aircraft should venture over domestic skies. This intricate system, developed by AT&T and the military, meant connecting LEADING THE FUTURE As networking technology has advanced greatly over the past decade, so too has security.