Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Battle at the edge: How the convergence of 5G and IoT are opening a new front for threat actors

By Christopher Day
Cybersecurity Intrusion Detection
October 5, 2020

One of the enduring truths about the Internet lies in its power to connect – to information and applications, to our homes, and of course, to one another. The flip side of course, is that the more we facilitate these connections, the more vulnerable we become.

The forthcoming rollout of 5G and continued mass adoption of IoT represent two distinct yet converging macro technology trends that promise to transform the way we work and live. Moreover, as bandwidth capacity surges and more connected things come online, we will witness the further dissolution of the network perimeter as more applications and data get pushed to ‘the Edge’.

But with this untold potential also comes an assortment of risk factors and novel attack vectors that threat actors are already finding ways to exploit.

As the age-old security axiom goes, ‘you’re only as secure as your weakest link’ – as we accelerate the speed and volume of connected devices and people, one thing is for certain: there will be no shortage of weak links.

 

A tidal wave of connected things

We’ve all seen read the stats about the exponential growth of connected things – be they industrial sensors, wearables, smart home devices, or vehicles. Analyst firm IDC forecasts that there will be more than 41 billion connected devices by 2025 or a bit more than four connected devices for every human being on the planet.

Meanwhile, IDC projects the number of 5G connections will balloon from roughly 10 million in 2019 to more than one billion and that 5G will represent 8.9% of all mobile transactions by 2023.

Not only will there be significantly more connected things, but the next wave of things promise to be both smarter and more multi-purposed than current generation IoT devices - the vast majority of which are little more than Internet-enabled beacons that wirelessly transmit and receive small packets of data. Rather, the connected things of tomorrow will embed software, compute and processing capabilities which will require low-latency, high-throughput wireless networks to realize their full potential.

IoTs in the crosshairs

Since the current generation IoT devices were designed primarily as simple connectivity points, it’s hardly surprising that threat actors have been actively targeting them. 

Compounding the problem is the fact that since IoT devices are so easy to deploy, they are often forgotten as these ‘unmanaged devices’ are not typically subject to the same rigorous security inventory asset tracking rules and regulations as other ‘valued’ IT assets. Because these devices are connected to the same network as users, servers and applications, they represent a potential back door just waiting to be kicked in.

And we’ve already witnessed frightening examples of how attackers are leveraging these weak links to gain a foothold and overwhelm a network. The Mirai botnet is perhaps the most notorious example of an attack that strung together hundreds of thousands of compromised devices and ultimately succeeded – albeit unintentionally – in knocking out Internet access across the East Coast in 2016.

Mirai wasn’t an especially sophisticated piece of code but rather what made it so effective was its ability to scan networks for large blocks of open Telnet ports and then used a simple credential stuffing script populated with the most frequently used username/passwords default combos that were never updated. In this manner the IoT botnet swelled to more than 600,000 devices – a misfit zombie army comprised of routers, air quality sensors, surveillance cameras, and even DVRs.

While the types of attacks are alarming on their own, the stakes are even higher when it comes to attacks on critical infrastructure by which a successful breach of IIoT connected devices could have catastrophic consequences. On top of this, legacy communications protocols such as GPRS Tunneling Protocol (GTP) which have shown to be vulnerable, will continue to be used by 5G networks.

It’s evident that a new security management paradigm, one based on adaptive software-defined rules and unified management capabilities will need to evolve alongside these converging trends.

 

In software we trust

As the renowned entrepreneur and venture capitalist Marc Andreessen famously quipped a decade ago, ‘software is eating the world’. While the main thrust of his argument was that every company needs to think like a software company, the same principles are particularly resonant to the current state of cybersecurity and speak to why a software-minded approach will be required to secure the billions of connected things from being turned against us.

This of course is the fundamental premise of a Zero Trust framework which seeks to challenge everyone and anything attempting to connect to the network. Just like you wouldn’t let a stranger into your house and then ask them what they want, Zero Trust directs you to treat the network as hostile until proven otherwise. And it accomplishes this through a software-defined approach to network security whereby bits and bytes are given primacy as a first line of defense versus the unwieldy network appliances that were simply never designed to meet the challenges of today’s distributed network. 

A Zero Trust software-enabled framework provides a number of advantages to enterprise organizations looking to wrest back control of their network through:

  • Simplified micro-segmentation: Zero Trust provides a superior framework for facilitating micro-segmentation at the workload or device level, enabling network administrators to restrict devices to specific segments, prevent overentitlement, and limit lateral threats regardless of device type, network, or location
  • Automated access control: According to the Verizon DBIR report, human-based network configuration errors continue to be one of the leading causes of data breaches. A software-driven Zero Trust approach can mitigate these avoidable mistakes by automating how, when and where devices are connecting to the network.
  • Unified & seamless policy extension: Instead of having to define new rules as devices are added to the network, Zero Trust enables organizations to unifiy their security policies and extend the principles of ‘least privilege’ access to specific devices independent of underlying architecture.

As with any new disruptive innovation, we must strive to strike a balance between risk and reward. While it’s exciting to ponder the possibilities of a world powered by 5G and an constellation of connected things, we must first establish a secure foundation to support these innovations. A software-based, Zero Trust security framework represents our best chance at securing the Edge from the connected things of tomorrow.

KEYWORDS: 5G cyber security information security Internet of Things risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Christopher day

Christopher Day is the Chief Cybersecurity Officer for AppGate and has held senior leadership roles at a number of leading technology and cybersecurity companies including Terremark, Packet Forensics, and Invincea. Day has authored and co-authored four patents in cybersecurity, is a Fellow of the American Academy of Forensic Sciences and regularly speaks and lectures on a variety of cybersecurity topics.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Gaps in Cybersecurity Programs

    War at Home: How U.S. Corporations are on the Front Lines of the Silent War on Privacy

    See More
  • 5G and IoT security

    The intersection of 5G, security and IoT 2.0

    See More
  • multicolor pyramid on red orange background

    The threat landscape and best practices for securing the edge

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing