› Forums › Security › News (Security) › 5G and IoT: How to Approach the Security Implications
Tagged: Governance_G12, SecureElement_H11, Security_S12
- This topic has 1 voice and 0 replies.
-
AuthorPosts
-
-
November 13, 2019 at 5:27 am #36542
#News(Security) [ via IoTGroup ]
Headings…
5G and IoT: How to Approach the Security Implications
Questions and Answers
Suggested articles
IoT Security Challenges in a 5G Era: Expert Advice
Gamification Can Transform Company Cybersecurity Culture
Google Squashes High-Severity Blink Browser Engine Flaw
Discussion
InfoSec InsiderAuto extracted Text……
And finally, a Q&A covers the 5G rollout timeline, the importance of adding security to IoT devices during the design phase, carrier network security, how attackers can target specific classes of device and more.
One of the things I’d like to make as a main takeaway here is that because of the nature of the way that these bots spread, if you’ve got a vulnerable IoT device and it’s visible from the internet, then that device is going to be infected literally in a matter of minutes.
So one of the things I want to cover specifically around vulnerabilities, we work a lot with our partners like FireEye who do a lot of research and remediation around industrial control systems, as well as IoT, and actually a lot of the findings throughout a lot of the data that we’re seeing in the cloud as we process transactions, DNS queries, data requests, including HTTP and advanced protocols, always by malware and botnets to infiltrate IoT devices, one of the things that are fundamental to these changes is the fact that the network perimeter is really changing and evolving.
In a world where the perimeter’s fixed it’s very easy to isolate one network from another, but in a 5G world where things are connected wirelessly, not only is segmentation important but the ability to have all of the connectivity from all IoT devices run through a security system regardless of its location.
A lot of what I’m looking at and thinking about and the solutions we’re focused on are really about security at the IoT device level.
But if you think about IoT devices, sometimes they’re installed in areas that are very difficult to reach, especially when it comes to cameras and things of that nature
Read More..
AutoTextExtraction by Working BoT using SmartNews 1.0299999999 Build 26 Aug 2019
-
-
AuthorPosts
- You must be logged in to reply to this topic.