Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & Training

The Rise of the Internet of Things

By Darren Anstee
internet of things
January 20, 2020

They are already here. And they might already outnumber us. Their proliferation is breath-taking, with an estimated population reaching 125 billion in the next 10 years. Internet of Things (IoT) devices are the faces of a societal digital transformation, poised to revolutionize the way we live, play, and work. But are we really in control of this exponential explosion of Internet-connected machines? And, what does this massive network mean from a security perspective?

There are many risks associated with IoT devices which could affect everything from wearables to the industrial control systems behind power grids. A new generation of malware is targeting gadgets faster than ever before. Indeed, the average time required to compromise a vulnerable IoT device connected to the Internet is now only five minutes.

Many IoT devices are online 24/7 and have significant bandwidth available, making them attractive targets for conscription into Distributed Denial of Service (DDoS) botnets. And, hackers can also use them as stepping-stones to compromise enterprise or home networks utilizing their backend connectivity.

As 5G becomes a reality, billions of humans and trillions of machines can take advantage of enhanced mobile broadband for a wide range of applications from emergency services to virtual reality. And to make matters worse, these devices have a long shelf life, which means obsolete and insecure IoT devices will be around for years to come.

Without a doubt, everyone faces an unprecedented technical challenge when it comes to managing IoT risk. Internet-facing IoTs represent only five percent of the total number of devices, however all devices represent a complex risk management problem due to their inherent nature:

  • The IoT market is fragmented, with many standards at play requiring different tools for monitoring and operations.
  • IoT devices have a small hardware footprint with minimal computing power, putting them out of reach of traditional agent-based security management tools.
  • They also contain numerous software stacks with proprietary technologies and formats, making maintenance almost impossible.
  • IoT manufacturers overlook engineering and security investments due to intense competition and market urgency. As a result, devices often come with hardcoded usernames and passwords, unnecessary services, and remotely exploitable vulnerabilities with no available patches.

Even as things start to improve, with vendors making software updates and patches available, these updates are not always practical. They don’t consider the device’s location, whether it can be updated remotely or requires physical access, and whether the user has the technical where-with-all or motivation to perform the update. There is a major issue here.

As such, network operators are finding an increasing need to identify the IoT devices connected to their networks. This will allow them to assess the level of risk, determine the nature of that risk and manage it appropriately. But this is no easy task because service providers need both broad and deep visibility into networks. Luckily, operators are working with trusted partners to get the visibility and monitoring capabilities they need across their evolving service infrastructure.

IoT devices are driving radical technological and cultural change, transforming our current IT landscape. They will fuel innovation in industries like healthcare, transportation and public utilities. Consumers are eagerly awaiting a smart future that features ultra-fast transfer rates and enhanced user experience.

Users and businesses will only be safe on these networks if service providers have effective oversight and security. Network operators must ensure privacy, availability and reliability so their systems can achieve their full potential.

KEYWORDS: cyber security cybersecurity hackers Internet of Things (IoT) mobile security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Darren anstee

Darren Anstee is Chief Technology Officer, SBO International, NETSCOUT. Anstee has 20 years of experience in pre-sales, consultancy and support for telecom and security solutions. As Chief Technology Officer, SBO International, at NETSCOUT, Darren works across the research, strategy, and pre-sales aspects of Arbor's traffic monitoring, threat detection and mitigation solutions for service providers and enterprises around the world. He is an integral part of Arbor's Security Engineering & Response Team (ASERT).

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Encryption Future - Security Magazine

    Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

    See More
  • smartphone2-900px.jpg

    Consumers Want “Internet of Things” to Become the “Internet of Intelligence”

    See More
  • smartcity

    How the Internet of Things can Improve Public Safety

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing