5G and IoT: How to Approach the Security Implications

Forums Security News (Security) 5G and IoT: How to Approach the Security Implications

  • This topic has 1 voice and 0 replies.
Viewing 0 reply threads
  • Author
    Posts
    • #36542
      Telegram SmartBoT
      Moderator
      • Topic 5959
      • Replies 0
      • posts 5959
        @tgsmartbot

        #News(Security) [ via IoTGroup ]


        Headings…
        5G and IoT: How to Approach the Security Implications
        Questions and Answers
        Suggested articles
        IoT Security Challenges in a 5G Era: Expert Advice
        Gamification Can Transform Company Cybersecurity Culture
        Google Squashes High-Severity Blink Browser Engine Flaw
        Discussion
        InfoSec Insider

        Auto extracted Text……

        And finally, a Q&A covers the 5G rollout timeline, the importance of adding security to IoT devices during the design phase, carrier network security, how attackers can target specific classes of device and more.
        One of the things I’d like to make as a main takeaway here is that because of the nature of the way that these bots spread, if you’ve got a vulnerable IoT device and it’s visible from the internet, then that device is going to be infected literally in a matter of minutes.
        So one of the things I want to cover specifically around vulnerabilities, we work a lot with our partners like FireEye who do a lot of research and remediation around industrial control systems, as well as IoT, and actually a lot of the findings throughout a lot of the data that we’re seeing in the cloud as we process transactions, DNS queries, data requests, including HTTP and advanced protocols, always by malware and botnets to infiltrate IoT devices, one of the things that are fundamental to these changes is the fact that the network perimeter is really changing and evolving.
        In a world where the perimeter’s fixed it’s very easy to isolate one network from another, but in a 5G world where things are connected wirelessly, not only is segmentation important but the ability to have all of the connectivity from all IoT devices run through a security system regardless of its location.
        A lot of what I’m looking at and thinking about and the solutions we’re focused on are really about security at the IoT device level.
        But if you think about IoT devices, sometimes they’re installed in areas that are very difficult to reach, especially when it comes to cameras and things of that nature

         


        Read More..
        AutoTextExtraction by Working BoT using SmartNews 1.0299999999 Build 26 Aug 2019

    Viewing 0 reply threads
    • You must be logged in to reply to this topic.