Tony Lauro, Akamai Director of Security Technology & Strategy, discusses three of the key obfuscation techniques attackers use to break down defenses and exploit systems through undetectable means, including impersonation, trusted site, and human ingenuity techniques.