Education Center
NetAbstraction in the News
Cloud Security Innovator Dustin Webber Joins NetAbstraction as CSO
April 5, 2022 - NetAbstraction is excited to announce the appointment of cloud security innovator and infosec luminary Dustin Willis Webber as Chief Security Officer. Dustin will drive security innovation, strategy and development of NetAbstraction’s products that enable customers to disguise their organizational resources and communications on the Internet and in the cloud.
NetAbstraction and Jacobs Expand Alliance to Offer Advanced Cyber Solutions to Commercial Clients
March 29, 2022 - NetAbstraction, the Zero Trust network privacy and security company, today announced they have expanded their alliance with Jacobs (NYSE:J) beyond the Federal government sector to offer NetAbstraction’s ransomware protection technology to commercial customers, beginning with the global higher education community.
NetAbstraction Announces International Expansion in EMEA
March 16, 2022 - NetAbstraction is excited to announce the expansion of our company’s operations in Europe, the Middle East, and Africa (EMEA) with the opening of an office in Cork Ireland, and the appointment of former AT&T cybersecurity executive Conor O’Brien as Vice President of EMEA Sales.
Alissa Knight Joins NetAbstraction Board of Advisors
March 9, 2022 - NetAbstraction, announces Alissa Knight has joined the company’s Board of Advisors to provide unique go-to-market expertise that focuses on marketing cybersecurity through the lens of hackers. Alissa is managing partner of Knight Ink, Knight Studios, and Knight Events.
Former NSA director leads conference on cyber security at Georgia Cyber Center
March 3, 2022 - A panel of cyber security leaders including former NSA director Admiral Michael Rogers gave information on how people can protect themselves and their companies.
NetAbstraction Opens New Office in Augusta, Georgia to Tap Cyber Security Talent in Region
January 19, 2022 - NetAbstraction, the security by obfuscation company, today announced it has opened a new office here in close proximity to Fort Gordon and the Georgia Cyber Center. NetAbstraction expects to hire more than 20 new employees in Augusta this year.
NetAbstraction Provides Government-Grade Security with the release of NetEnclave
December 6, 2021 - NetAbstraction, the security by obfuscation company, is creating NetAbstraction NetEnclave, a cloud obfuscation service that offers a veil of secrecy around applications, resources, and data that makes an organization’s assets invisible to attackers.
To Prevent Cyberattacks, Make Reconnaissance Harder
December 2, 2021 - Evasion techniques, which have long been used by cybercriminals to cover their tracks, can become a proactive security measure when used for defensive purposes. - Forbes
NetAbstraction Appoints Brian Stone Chief Revenue Officer
NetAbstraction, the network privacy and security company, today announced the appointment of Brian Stone as Chief Revenue Officer (CRO). Brian will oversee all business functions across sales, field operations, marketing, channel and customer success.
Cloud Security Innovator Dustin Webber Joins NetAbstraction as CSO
April 5, 2022 - NetAbstraction is excited to announce the appointment of cloud security innovator and infosec luminary Dustin Willis Webber as Chief Security Officer. Dustin will drive security innovation, strategy and development of NetAbstraction’s products that enable customers to disguise their organizational resources and communications on the Internet and in the cloud.
NetAbstraction and Jacobs Expand Alliance to Offer Advanced Cyber Solutions to Commercial Clients
March 29, 2022 - NetAbstraction, the Zero Trust network privacy and security company, today announced they have expanded their alliance with Jacobs (NYSE:J) beyond the Federal government sector to offer NetAbstraction’s ransomware protection technology to commercial customers, beginning with the global higher education community.
NetAbstraction Announces International Expansion in EMEA
March 16, 2022 - NetAbstraction is excited to announce the expansion of our company’s operations in Europe, the Middle East, and Africa (EMEA) with the opening of an office in Cork Ireland, and the appointment of former AT&T cybersecurity executive Conor O’Brien as Vice President of EMEA Sales.
Alissa Knight Joins NetAbstraction Board of Advisors
March 9, 2022 - NetAbstraction, announces Alissa Knight has joined the company’s Board of Advisors to provide unique go-to-market expertise that focuses on marketing cybersecurity through the lens of hackers. Alissa is managing partner of Knight Ink, Knight Studios, and Knight Events.
Former NSA director leads conference on cyber security at Georgia Cyber Center
March 3, 2022 - A panel of cyber security leaders including former NSA director Admiral Michael Rogers gave information on how people can protect themselves and their companies.
NetAbstraction Opens New Office in Augusta, Georgia to Tap Cyber Security Talent in Region
January 19, 2022 - NetAbstraction, the security by obfuscation company, today announced it has opened a new office here in close proximity to Fort Gordon and the Georgia Cyber Center. NetAbstraction expects to hire more than 20 new employees in Augusta this year.
NetAbstraction Provides Government-Grade Security with the release of NetEnclave
December 6, 2021 - NetAbstraction, the security by obfuscation company, is creating NetAbstraction NetEnclave, a cloud obfuscation service that offers a veil of secrecy around applications, resources, and data that makes an organization’s assets invisible to attackers.
To Prevent Cyberattacks, Make Reconnaissance Harder
December 2, 2021 - Evasion techniques, which have long been used by cybercriminals to cover their tracks, can become a proactive security measure when used for defensive purposes. - Forbes
NetAbstraction Appoints Brian Stone Chief Revenue Officer
NetAbstraction, the network privacy and security company, today announced the appointment of Brian Stone as Chief Revenue Officer (CRO). Brian will oversee all business functions across sales, field operations, marketing, channel and customer success.
Cloud Security Innovator Dustin Webber Joins NetAbstraction as CSO
April 5, 2022 - NetAbstraction is excited to announce the appointment of cloud security innovator and infosec luminary Dustin Willis Webber as Chief Security Officer. Dustin will drive security innovation, strategy and development of NetAbstraction’s products that enable customers to disguise their organizational resources and communications on the Internet and in the cloud.
NetAbstraction and Jacobs Expand Alliance to Offer Advanced Cyber Solutions to Commercial Clients
March 29, 2022 - NetAbstraction, the Zero Trust network privacy and security company, today announced they have expanded their alliance with Jacobs (NYSE:J) beyond the Federal government sector to offer NetAbstraction’s ransomware protection technology to commercial customers, beginning with the global higher education community.
NetAbstraction Announces International Expansion in EMEA
March 16, 2022 - NetAbstraction is excited to announce the expansion of our company’s operations in Europe, the Middle East, and Africa (EMEA) with the opening of an office in Cork Ireland, and the appointment of former AT&T cybersecurity executive Conor O’Brien as Vice President of EMEA Sales.
Alissa Knight Joins NetAbstraction Board of Advisors
March 9, 2022 - NetAbstraction, announces Alissa Knight has joined the company’s Board of Advisors to provide unique go-to-market expertise that focuses on marketing cybersecurity through the lens of hackers. Alissa is managing partner of Knight Ink, Knight Studios, and Knight Events.
Former NSA director leads conference on cyber security at Georgia Cyber Center
March 3, 2022 - A panel of cyber security leaders including former NSA director Admiral Michael Rogers gave information on how people can protect themselves and their companies.
NetAbstraction Opens New Office in Augusta, Georgia to Tap Cyber Security Talent in Region
January 19, 2022 - NetAbstraction, the security by obfuscation company, today announced it has opened a new office here in close proximity to Fort Gordon and the Georgia Cyber Center. NetAbstraction expects to hire more than 20 new employees in Augusta this year.
NetAbstraction Provides Government-Grade Security with the release of NetEnclave
December 6, 2021 - NetAbstraction, the security by obfuscation company, is creating NetAbstraction NetEnclave, a cloud obfuscation service that offers a veil of secrecy around applications, resources, and data that makes an organization’s assets invisible to attackers.
To Prevent Cyberattacks, Make Reconnaissance Harder
December 2, 2021 - Evasion techniques, which have long been used by cybercriminals to cover their tracks, can become a proactive security measure when used for defensive purposes. - Forbes
Of Interest

Forbes: When Deploying SASE, Don’t Overlook Network Privacy
To protect “anywhere-anytime” access to digital resources, including applications and data, enterprises are increasingly adopting secure access security edge (SASE) architectures. This emerging approach combines comprehensive network security functions with WAN (wide area network) capabilities to support the dynamic, secure-access needs of organizations.

SecurityWeek: Healthcare and the Other CIA
For IT professionals, the acronym “CIA” refers to the Confidentiality, Integrity and Availability of information, not the Central Intelligence Agency. However, given the current threat level to data security, IT teams may wish they could get a little help from people with intelligence community tradecraft experience.

Take Back Control Of Your WAN With Enhanced Cloud Interconnection
February 17, 2022 – As the use of public cloud services continues to increase, most enterprises have decided to use multiple platform service providers. This is being driven by the fact that each cloud provider has unique strengths in server infrastructure and networking capabilities.

Understanding The Power Of Network Obfuscation
Enterprise-level cyberattacks continue to increase dramatically while threats are growing in sophistication. Meanwhile, defensive responses tend to be reactive rather than proactive. Typical commercial and government networks are fixed, static, easily located and thus more vulnerable to attack. We have to look at the problem differently.

Reeling In Cybersecurity Risks For Executives
August 3, 2021 - Anyone involved with cybersecurity understands that not all IT systems and devices represent the same level of risk. Some hold more valuable data than others. Some are mission-critical and others, while important, don’t spell “doom” if they are compromised.

Leading Threat to Industrial Security is Not What You Think
July 26, 2021 - As attackers become more sophisticated, so do their attacks. This in turn exposes threat vectors that once were thought to be well protected, or at least not interesting enough to attack. Nowhere is this truer than in industrial control systems (ICS) environments.

Why VPNs Are Neither Secure Nor Private
Jul 26, 2021 - Most people believe that virtual private networks (VPNs), which create a point-to-point tunnel between two computer devices, provide security and privacy of their communications. However, the level of security is only as good as the type of encryption used to protect the transmission of data.

Like Their Adversaries, Threat Hunters Need Anonymity
June 28, 2021 - Now that operations are returning to normal—or the New Normal, which is bound to include a big segment of remote work—security needs to adjust to a number of workers who will continue to work from home. And that includes a fair amount of security analysts and other network security staff. How can we be sure that threat hunters stay safe, and don’t themselves become a threat to the systems they protect? - SecurityWeek

Attackers Use Obscurity, Enterprises Should Too
May 6, 2021 - As threat actors attempt to remain undetected to carry out attacks, they often use a variety of tools to obscure their identities and activity. Organizations meanwhile leave their networks and activity open for inspection by anyone who chooses to perform basic reconnaissance. - SecurityWeek

Forbes: When Deploying SASE, Don’t Overlook Network Privacy
To protect “anywhere-anytime” access to digital resources, including applications and data, enterprises are increasingly adopting secure access security edge (SASE) architectures. This emerging approach combines comprehensive network security functions with WAN (wide area network) capabilities to support the dynamic, secure-access needs of organizations.

SecurityWeek: Healthcare and the Other CIA
For IT professionals, the acronym “CIA” refers to the Confidentiality, Integrity and Availability of information, not the Central Intelligence Agency. However, given the current threat level to data security, IT teams may wish they could get a little help from people with intelligence community tradecraft experience.

Take Back Control Of Your WAN With Enhanced Cloud Interconnection
February 17, 2022 – As the use of public cloud services continues to increase, most enterprises have decided to use multiple platform service providers. This is being driven by the fact that each cloud provider has unique strengths in server infrastructure and networking capabilities.

Understanding The Power Of Network Obfuscation
Enterprise-level cyberattacks continue to increase dramatically while threats are growing in sophistication. Meanwhile, defensive responses tend to be reactive rather than proactive. Typical commercial and government networks are fixed, static, easily located and thus more vulnerable to attack. We have to look at the problem differently.

Reeling In Cybersecurity Risks For Executives
August 3, 2021 - Anyone involved with cybersecurity understands that not all IT systems and devices represent the same level of risk. Some hold more valuable data than others. Some are mission-critical and others, while important, don’t spell “doom” if they are compromised.

Leading Threat to Industrial Security is Not What You Think
July 26, 2021 - As attackers become more sophisticated, so do their attacks. This in turn exposes threat vectors that once were thought to be well protected, or at least not interesting enough to attack. Nowhere is this truer than in industrial control systems (ICS) environments.

Why VPNs Are Neither Secure Nor Private
Jul 26, 2021 - Most people believe that virtual private networks (VPNs), which create a point-to-point tunnel between two computer devices, provide security and privacy of their communications. However, the level of security is only as good as the type of encryption used to protect the transmission of data.

Like Their Adversaries, Threat Hunters Need Anonymity
June 28, 2021 - Now that operations are returning to normal—or the New Normal, which is bound to include a big segment of remote work—security needs to adjust to a number of workers who will continue to work from home. And that includes a fair amount of security analysts and other network security staff. How can we be sure that threat hunters stay safe, and don’t themselves become a threat to the systems they protect? - SecurityWeek

Attackers Use Obscurity, Enterprises Should Too
May 6, 2021 - As threat actors attempt to remain undetected to carry out attacks, they often use a variety of tools to obscure their identities and activity. Organizations meanwhile leave their networks and activity open for inspection by anyone who chooses to perform basic reconnaissance. - SecurityWeek

Forbes: When Deploying SASE, Don’t Overlook Network Privacy
To protect “anywhere-anytime” access to digital resources, including applications and data, enterprises are increasingly adopting secure access security edge (SASE) architectures. This emerging approach combines comprehensive network security functions with WAN (wide area network) capabilities to support the dynamic, secure-access needs of organizations.

SecurityWeek: Healthcare and the Other CIA
For IT professionals, the acronym “CIA” refers to the Confidentiality, Integrity and Availability of information, not the Central Intelligence Agency. However, given the current threat level to data security, IT teams may wish they could get a little help from people with intelligence community tradecraft experience.

Take Back Control Of Your WAN With Enhanced Cloud Interconnection
February 17, 2022 – As the use of public cloud services continues to increase, most enterprises have decided to use multiple platform service providers. This is being driven by the fact that each cloud provider has unique strengths in server infrastructure and networking capabilities.

Understanding The Power Of Network Obfuscation
Enterprise-level cyberattacks continue to increase dramatically while threats are growing in sophistication. Meanwhile, defensive responses tend to be reactive rather than proactive. Typical commercial and government networks are fixed, static, easily located and thus more vulnerable to attack. We have to look at the problem differently.

Reeling In Cybersecurity Risks For Executives
August 3, 2021 - Anyone involved with cybersecurity understands that not all IT systems and devices represent the same level of risk. Some hold more valuable data than others. Some are mission-critical and others, while important, don’t spell “doom” if they are compromised.

Leading Threat to Industrial Security is Not What You Think
July 26, 2021 - As attackers become more sophisticated, so do their attacks. This in turn exposes threat vectors that once were thought to be well protected, or at least not interesting enough to attack. Nowhere is this truer than in industrial control systems (ICS) environments.

Why VPNs Are Neither Secure Nor Private
Jul 26, 2021 - Most people believe that virtual private networks (VPNs), which create a point-to-point tunnel between two computer devices, provide security and privacy of their communications. However, the level of security is only as good as the type of encryption used to protect the transmission of data.

Like Their Adversaries, Threat Hunters Need Anonymity
June 28, 2021 - Now that operations are returning to normal—or the New Normal, which is bound to include a big segment of remote work—security needs to adjust to a number of workers who will continue to work from home. And that includes a fair amount of security analysts and other network security staff. How can we be sure that threat hunters stay safe, and don’t themselves become a threat to the systems they protect? - SecurityWeek

Attackers Use Obscurity, Enterprises Should Too
May 6, 2021 - As threat actors attempt to remain undetected to carry out attacks, they often use a variety of tools to obscure their identities and activity. Organizations meanwhile leave their networks and activity open for inspection by anyone who chooses to perform basic reconnaissance. - SecurityWeek
Do you have questions about our services?
If they can’t find you, they can’t attack you!™
NetAbstraction provides a carrier-class network that shields your identity and provides additional security for your communications on the Internet and in the cloud.
We provide a patented, cloud-based service that proactively prevents cyber-attacks by disguising and varying your network pathways. Our exclusive platform masks and protects your networks, communications, applications and data with unique obfuscation solutions.
Operates at carrier speed. Reduces your cyber profile. Saves you money and headaches. Implements quickly.
QuickLinks
Contact
Virginia
5180 Parkstone Dr. Suite 260
Chantilly, VA 20151
(703) 870-7481
5180 Parkstone Dr. Suite 260
Chantilly, VA 20151
(703) 870-7481
Georgia
1 10th St, Suite 480
Augusta, GA 30901
Ireland
Cork 1 Horgan’s Quay
Office 457
Waterfront Square
Cork T23 PPT8, Ireland
Office 457
Waterfront Square
Cork T23 PPT8, Ireland