Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & Training

The Rise of the Internet of Things

By Darren Anstee
internet of things
January 20, 2020

They are already here. And they might already outnumber us. Their proliferation is breath-taking, with an estimated population reaching 125 billion in the next 10 years. Internet of Things (IoT) devices are the faces of a societal digital transformation, poised to revolutionize the way we live, play, and work. But are we really in control of this exponential explosion of Internet-connected machines? And, what does this massive network mean from a security perspective?

There are many risks associated with IoT devices which could affect everything from wearables to the industrial control systems behind power grids. A new generation of malware is targeting gadgets faster than ever before. Indeed, the average time required to compromise a vulnerable IoT device connected to the Internet is now only five minutes.

Many IoT devices are online 24/7 and have significant bandwidth available, making them attractive targets for conscription into Distributed Denial of Service (DDoS) botnets. And, hackers can also use them as stepping-stones to compromise enterprise or home networks utilizing their backend connectivity.

As 5G becomes a reality, billions of humans and trillions of machines can take advantage of enhanced mobile broadband for a wide range of applications from emergency services to virtual reality. And to make matters worse, these devices have a long shelf life, which means obsolete and insecure IoT devices will be around for years to come.

Without a doubt, everyone faces an unprecedented technical challenge when it comes to managing IoT risk. Internet-facing IoTs represent only five percent of the total number of devices, however all devices represent a complex risk management problem due to their inherent nature:

  • The IoT market is fragmented, with many standards at play requiring different tools for monitoring and operations.
  • IoT devices have a small hardware footprint with minimal computing power, putting them out of reach of traditional agent-based security management tools.
  • They also contain numerous software stacks with proprietary technologies and formats, making maintenance almost impossible.
  • IoT manufacturers overlook engineering and security investments due to intense competition and market urgency. As a result, devices often come with hardcoded usernames and passwords, unnecessary services, and remotely exploitable vulnerabilities with no available patches.

Even as things start to improve, with vendors making software updates and patches available, these updates are not always practical. They don’t consider the device’s location, whether it can be updated remotely or requires physical access, and whether the user has the technical where-with-all or motivation to perform the update. There is a major issue here.

As such, network operators are finding an increasing need to identify the IoT devices connected to their networks. This will allow them to assess the level of risk, determine the nature of that risk and manage it appropriately. But this is no easy task because service providers need both broad and deep visibility into networks. Luckily, operators are working with trusted partners to get the visibility and monitoring capabilities they need across their evolving service infrastructure.

IoT devices are driving radical technological and cultural change, transforming our current IT landscape. They will fuel innovation in industries like healthcare, transportation and public utilities. Consumers are eagerly awaiting a smart future that features ultra-fast transfer rates and enhanced user experience.

Users and businesses will only be safe on these networks if service providers have effective oversight and security. Network operators must ensure privacy, availability and reliability so their systems can achieve their full potential.

KEYWORDS: cyber security cybersecurity hackers Internet of Things (IoT) mobile security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Darren anstee

Darren Anstee is Chief Technology Officer, SBO International, NETSCOUT. Anstee has 20 years of experience in pre-sales, consultancy and support for telecom and security solutions. As Chief Technology Officer, SBO International, at NETSCOUT, Darren works across the research, strategy, and pre-sales aspects of Arbor's traffic monitoring, threat detection and mitigation solutions for service providers and enterprises around the world. He is an integral part of Arbor's Security Engineering & Response Team (ASERT).

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Encryption Future - Security Magazine

    Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

    See More
  • smartphone2-900px.jpg

    Consumers Want “Internet of Things” to Become the “Internet of Intelligence”

    See More
  • smartcity

    How the Internet of Things can Improve Public Safety

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing