Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Battle at the edge: How the convergence of 5G and IoT are opening a new front for threat actors

By Christopher Day
Cybersecurity Intrusion Detection
October 5, 2020

One of the enduring truths about the Internet lies in its power to connect – to information and applications, to our homes, and of course, to one another. The flip side of course, is that the more we facilitate these connections, the more vulnerable we become.

The forthcoming rollout of 5G and continued mass adoption of IoT represent two distinct yet converging macro technology trends that promise to transform the way we work and live. Moreover, as bandwidth capacity surges and more connected things come online, we will witness the further dissolution of the network perimeter as more applications and data get pushed to ‘the Edge’.

But with this untold potential also comes an assortment of risk factors and novel attack vectors that threat actors are already finding ways to exploit.

As the age-old security axiom goes, ‘you’re only as secure as your weakest link’ – as we accelerate the speed and volume of connected devices and people, one thing is for certain: there will be no shortage of weak links.

 

A tidal wave of connected things

We’ve all seen read the stats about the exponential growth of connected things – be they industrial sensors, wearables, smart home devices, or vehicles. Analyst firm IDC forecasts that there will be more than 41 billion connected devices by 2025 or a bit more than four connected devices for every human being on the planet.

Meanwhile, IDC projects the number of 5G connections will balloon from roughly 10 million in 2019 to more than one billion and that 5G will represent 8.9% of all mobile transactions by 2023.

Not only will there be significantly more connected things, but the next wave of things promise to be both smarter and more multi-purposed than current generation IoT devices - the vast majority of which are little more than Internet-enabled beacons that wirelessly transmit and receive small packets of data. Rather, the connected things of tomorrow will embed software, compute and processing capabilities which will require low-latency, high-throughput wireless networks to realize their full potential.

IoTs in the crosshairs

Since the current generation IoT devices were designed primarily as simple connectivity points, it’s hardly surprising that threat actors have been actively targeting them. 

Compounding the problem is the fact that since IoT devices are so easy to deploy, they are often forgotten as these ‘unmanaged devices’ are not typically subject to the same rigorous security inventory asset tracking rules and regulations as other ‘valued’ IT assets. Because these devices are connected to the same network as users, servers and applications, they represent a potential back door just waiting to be kicked in.

And we’ve already witnessed frightening examples of how attackers are leveraging these weak links to gain a foothold and overwhelm a network. The Mirai botnet is perhaps the most notorious example of an attack that strung together hundreds of thousands of compromised devices and ultimately succeeded – albeit unintentionally – in knocking out Internet access across the East Coast in 2016.

Mirai wasn’t an especially sophisticated piece of code but rather what made it so effective was its ability to scan networks for large blocks of open Telnet ports and then used a simple credential stuffing script populated with the most frequently used username/passwords default combos that were never updated. In this manner the IoT botnet swelled to more than 600,000 devices – a misfit zombie army comprised of routers, air quality sensors, surveillance cameras, and even DVRs.

While the types of attacks are alarming on their own, the stakes are even higher when it comes to attacks on critical infrastructure by which a successful breach of IIoT connected devices could have catastrophic consequences. On top of this, legacy communications protocols such as GPRS Tunneling Protocol (GTP) which have shown to be vulnerable, will continue to be used by 5G networks.

It’s evident that a new security management paradigm, one based on adaptive software-defined rules and unified management capabilities will need to evolve alongside these converging trends.

 

In software we trust

As the renowned entrepreneur and venture capitalist Marc Andreessen famously quipped a decade ago, ‘software is eating the world’. While the main thrust of his argument was that every company needs to think like a software company, the same principles are particularly resonant to the current state of cybersecurity and speak to why a software-minded approach will be required to secure the billions of connected things from being turned against us.

This of course is the fundamental premise of a Zero Trust framework which seeks to challenge everyone and anything attempting to connect to the network. Just like you wouldn’t let a stranger into your house and then ask them what they want, Zero Trust directs you to treat the network as hostile until proven otherwise. And it accomplishes this through a software-defined approach to network security whereby bits and bytes are given primacy as a first line of defense versus the unwieldy network appliances that were simply never designed to meet the challenges of today’s distributed network. 

A Zero Trust software-enabled framework provides a number of advantages to enterprise organizations looking to wrest back control of their network through:

  • Simplified micro-segmentation: Zero Trust provides a superior framework for facilitating micro-segmentation at the workload or device level, enabling network administrators to restrict devices to specific segments, prevent overentitlement, and limit lateral threats regardless of device type, network, or location
  • Automated access control: According to the Verizon DBIR report, human-based network configuration errors continue to be one of the leading causes of data breaches. A software-driven Zero Trust approach can mitigate these avoidable mistakes by automating how, when and where devices are connecting to the network.
  • Unified & seamless policy extension: Instead of having to define new rules as devices are added to the network, Zero Trust enables organizations to unifiy their security policies and extend the principles of ‘least privilege’ access to specific devices independent of underlying architecture.

As with any new disruptive innovation, we must strive to strike a balance between risk and reward. While it’s exciting to ponder the possibilities of a world powered by 5G and an constellation of connected things, we must first establish a secure foundation to support these innovations. A software-based, Zero Trust security framework represents our best chance at securing the Edge from the connected things of tomorrow.

KEYWORDS: 5G cyber security information security Internet of Things risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Christopher day

Christopher Day is the Chief Cybersecurity Officer for AppGate and has held senior leadership roles at a number of leading technology and cybersecurity companies including Terremark, Packet Forensics, and Invincea. Day has authored and co-authored four patents in cybersecurity, is a Fellow of the American Academy of Forensic Sciences and regularly speaks and lectures on a variety of cybersecurity topics.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Gaps in Cybersecurity Programs

    War at Home: How U.S. Corporations are on the Front Lines of the Silent War on Privacy

    See More
  • 5G and IoT security

    The intersection of 5G, security and IoT 2.0

    See More
  • threat landscape of cybersecurity

    The new threat economy: A guide to cybercrime’s transformation – and how to respond

    See More

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!