The evolution of network security and debunking myths