Aggregator
Why IDC Believes the Next Billion Users Aren’t Human (And How to Secure Them) – Blog | Menlo Security
Learn how to secure AI agents in the enterprise. Explore the IDC Spotlight report on why agentic AI requires session-centric Browser Security Platforms.
The post Why IDC Believes the Next Billion Users Aren’t Human (And How to Secure Them) – Blog | Menlo Security appeared first on Security Boulevard.
Why Traditional Secure Networking Can’t Protect AI Workloads
Series Note: This article is Part Three of our ongoing series on AI‑driven side‑channel attacks and the architectural shifts required to defend against them. If you missed Part Two, you can read it here.
AI is changing the shape of enterprise infrastructure faster than any technology in decades. Models are larger, pipelines are more distributed, and inference is increasingly pushed to the edge. But while computing, storage, and orchestration have evolved to meet this moment, one layer has not: the network.
Most organizations still rely on VPNs, SDWAN, and IPsec tunnels which are technologies designed for a world of centralized applications, predictable traffic, and human-driven workflows. AI workloads break every one of those assumptions. And as a result, the secure networking stack that once felt “good enough” is now a structural liability.
This post explains why traditional secure networking fails AI systems, which risks that creates, and why a new transport architecture is required for the AI era.
1. AI Workloads Don’t Behave Like Traditional ApplicationsLegacy secure networking was built around a simple model: a small number of users accessing a small number of applications over predictable paths. AI workloads are the opposite.
AI traffic is high-volume, bursty, and time sensitiveTraining and inference pipelines move massive datasets across nodes. Even lightweight inference generates rapid, high-frequency traffic patterns. Traditional encrypted tunnels serialize this traffic through fixed paths, creating chokepoints that throttle throughput, amplify jitter, and enable cyber targeting by source and/or destination.
AI systems are inherently distributedModern AI spans edge sensors, GPU clusters, cloud regions, and on-premises environments. Traditional secure networking assumes stable, long-lived endpoints. AI introduces thousands of ephemeral ones and expects them to communicate securely, instantly, and continuously.
AI pipelines degrade quickly under latency or lossInference timing matters. Model accuracy and operational reliability depend on consistent, low-latency transport. VPNs and IPsec tunnels introduce overhead that AI workloads simply cannot absorb. The result is predictable performance bottlenecks, instability, and degraded model behavior.
2. Traditional Secure Networking Creates Predictable, Observable PatternsEven when encrypted, conventional tunnels expose metadata that adversaries can analyze. For AI systems, this becomes a risk for “side-channel” attacks.
Fixed tunnels create fixed fingerprintsA VPN or IPsec tunnel is a stable, discoverable conduit. Traffic volume, timing, directionality, source and destination are all visible, even if the payload is encrypted. For AI workloads, these patterns can reveal:
- When models are running
- How often inference occurs
- The size and sensitivity of data being processed
- Operational tempo and mission cadence
- Which traffic flows a cyber attacker might want to target
Attackers don’t need to break encryption. They just need to observe the tunnel.
SD‑WAN adds complexity, not stealthSDWAN improves routing flexibility, but it still relies on exposed tunnels and centralized controllers. Those controllers become high-value targets, and the tunnels remain predictable.
AI amplifies the riskAI workloads generate distinctive traffic signatures. A model running inference at the edge looks nothing like a user browsing the web. These signatures become fingerprints, and fingerprints become attack surfaces. Traditional secure networking doesn’t hide these fingerprints, it highlights them.
3. Legacy Secure Networking Fails Under Real-World ConditionsAI workloads don’t run in pristine networks. They run in the real world where latency, jitter, and packet loss are common.
Encrypted tunnels amplify packet lossWhen a packet is lost inside a tunnel, the entire encrypted frame often needs to be retransmitted. This compounds loss, increases latency, and destabilizes throughput.
Single-path routing creates single points of failureIf the path degrades, the workload degrades. AI inference pipelines can’t tolerate this.
High-latency environments break traditional securityRemote industrial sites, mobile networks, and cross-region cloud traffic all introduce latency. VPNs and IPsec tunnels struggle here, often reducing throughput by orders of magnitude. AI workloads don’t degrade gracefully. They fail abruptly.
4. Traditional Secure Networking Was Never Designed for Adversarial AI ThreatsAI introduces new threat vectors that legacy architectures were never meant to defend against.
Side-channel inferenceAttackers can infer model behavior, data sensitivity, topical content, and/or operational tempo from traffic patterns, even when encrypted.
Model exfiltrationIf an attacker can observe or disrupt data-in-motion, they can extract model outputs, training data, or inference results.
Operational disruptionAI systems increasingly support critical operations. Disrupting inference timing or data flow can have real-world consequences. Traditional secure networking protects confidentiality. AI systems require protection of confidentiality, observability, and operational integrity. Legacy tools only solve one of the three.
5. AI Requires a New Transport Architecture Built for Stealth, Resilience, and Performance
Protecting AI workloads requires a fundamentally different approach, one that eliminates predictable paths, removes exposed tunnels, and makes data-in-motion unobservable. The architectural principles are clear:
a. Multipath transport instead of single-path tunnelsTraffic must be split, scattered, and routed across multiple unpredictable paths to eliminate chokepoints, increase resiliency and throughput, and reduce observability.
b. Dynamic path shiftingRoutes must continuously change to prevent pattern analysis and side-channel inference.
c. Zero Trust at the transport layerEndpoints should never be exposed. Access should be ephemeral, least-privilege, and continuously verified.
d. Stealth by designThe network should be invisible to unauthorized observers (i.e., no discoverable tunnels, no exposed control planes, no predictable metadata).
e. Performance under degraded conditionsAI systems require architectures that traditional secure networking architecture cannot provide. AI workloads must maintain throughput and stability even in high-latency or lossy environments.
Conclusion: AI Has Outgrown Legacy Secure NetworkingAI is reshaping how organizations operate, compete, and defend themselves. But the secure networking architectures protecting these systems haven’t kept up. VPNs, SDWAN, and IPsec tunnels were built for a different era ... one with different traffic patterns, different threat models, and far lower stakes.
AI workloads demand secure transport that is fast, resilient, unobservable, and built for adversarial environments. Traditional secure networking can’t deliver that, and the gap is widening.
In the next post, we’ll explore what a stealth, multipath, Zero Trust transport layer looks like in practice and how it transforms the security and performance of AI systems from the edge to the cloud.
Get Expert HelpIf you’re evaluating how to secure AI workloads, our team can walk you through what a modern transport layer looks like in practice.
📞 Schedule a conversation with Dispersive: www.dispersive.io
Header image courtesy of StockSnap from Pixabay.
The post Why Traditional Secure Networking Can’t Protect AI Workloads appeared first on Security Boulevard.
Submit #790229: D-Link DI-8300 DI_8300-16.07.26A1 Command Injection [Duplicate]
CISA orders feds to patch exploited Ivanti EPMM flaw by Sunday
Weekly Threat Bulletin – April 8th, 2026
Lynx
You must login to view this content
Построить дом, завести семью, лишиться паролей. Обновление для The Sims 4 оказалось шпионской программой
Ivanti security advisory (AV26-068) – Update 2
New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy
Trellix strengthens data security for the GenAI era
Trellix announced enhanced data security capabilities and a strategic framework designed to help organizations confidently adopt generative AI while protecting sensitive data from exposure and loss. A three-part framework of policy, training, and technology accelerates secure AI adoption. (Source: Trellix) “The rapid adoption of AI tools across the enterprise is creating new and often invisible data risks,” said Alex Au Yeung, CPO, Trellix. “Trellix brings together policy, visibility, and enforcement in a unified framework to … More →
The post Trellix strengthens data security for the GenAI era appeared first on Help Net Security.
OpenSSL security advisory (AV26-329)
Alleged Breach of Shanghai Fudan Microelectronics Leaks 175MB of IC Schematics, Internal Documents, and Intellectual Property
Passport numbers for more than 300,000 leaked during December Eurail data breach
ALP001
You must login to view this content
ALP001
You must login to view this content
ALP001
You must login to view this content