Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementCyber Tactics ColumnSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceCybersecurity News

Cyber Tactics

Emerging technology, evolving threats — Part III: 5G and the new surfaces and strategies

By John McClurg
leader-to-leader

Kinwun / iStock / Getty Images Plus via Getty Images

cyber

Kinwun / iStock / Getty Images Plus via Getty Images

leader-to-leader
cyber
October 11, 2021

In the opening column of this series, “Emerging Technology, Evolving Threats,” [check out Part I and Part II], I wrote about quantum computing — how it portends both great opportunity and cybersecurity challenges. While very real and a subject we overlook at our peril, we most likely will not be grappling with its tangible impact any time soon.

5G, on the other hand, is an entirely different story. It’s here; it’s now, and it’s redefining network architecture. Taking responsibility for its advancement in a secure manner has never been more important, particularly given the growing aspects of our daily lives that are attaching to it. That begs the question: Who ultimately is responsible for its associated security? The adage, “what’s everybody’s business is nobody’s business,” looms menacingly over us.

 

In Pursuit of a Connected Yet Distributed Future

Our adversaries know that the attractive force of 5G-powered applications offer new attack vectors through which to advance their interests, which of course demands that we give as much attention — if not more attention — to countering those efforts in the way we secure those devices, applications and connections. As a society, we long ago began moving into a world where the barriers between physical and digital worlds were dissipating, and the proliferation of devices supported by 5G has only exacerbated that growing porosity. It reflects a complete physical overhaul of our essential networks and, because 5G reflects a conversion to what is mostly an all-software network, we must expect the cybersecurity challenges (and vulnerabilities) that come with that.

Christopher Krebs, former Director of CISA, rightly opined: “…5G is the single biggest critical infrastructure build that the globe has seen in the last 25 years and, coupled with the growth of cloud computing, automation, and…artificial intelligence, demands focused attention today to secure tomorrow.”

2G brought improved coverage and texting. 3G introduced voice with data and internet. 4G was synonymous with speed and LTE. 5G will be anchored to distributed computing, fundamentally changing the nature of data and its utility.

Every industry and area of our life will see the benefits of a 5G-driven era from the way we consume and engage with media to the options we’re offered in the form of personalized, proactive healthcare. A major transformation is on the way. We’ll begin to see more smart homes, smart cities, industrial automation, autonomous vehicles, telemedicine and virtual/augmented reality. At that heart of all that lies a key factor of the 5G network, which leaves us more vulnerable to cyberattacks than did its predecessors. That factor reflects a shift from centralized, hardware-based switching to distributed, software-defined digital routing. This evolution removes a singular location where security inspection and control protocols can be executed. 5G utilizes a web of digital routers throughout the network. In turn, as the core architecture fundamentally changes, our approach to securing it must change in step.

As I mentioned above, 5G presents new surfaces of attack for cybercriminals to exploit; an environment larger and more complex than the cyber community has heretofore defended. Defense strategies must be secure by design, built around 5G — not the other way around.

The importance of that orientation was demonstrated in 2016 when hackers shut down large portions of the internet by taking control of millions of low-cost chips in the motherboards of digital video recorders and security cameras. Consumers and manufacturers simply didn’t consider cybersecurity when buying low-cost connected devices, and retailers did not prioritize security in their stocking decisions. Manufacturers didn’t emphasize cybersecurity in the components they purchased and, thus, chip manufacturers did not include cyber protections in their products. There was no defined role or responsibility for ensuring and sustaining post-purchase cybersecurity.

The good news: Today, products are brought to market with 5G-ready capabilities built in. The product is being built around the technology — and that’s how, as a society, we’ll keep our connected devices secure.

 

Success Moving Forward

One crucial area of focus builds on the security foundation laid by 4G in the form of artificial intelligence- (AI) supported machine learning (ML). Cybersecurity strategies for the 5G world will need to use that technology to its fullest extent to proactively identify suspicious or malicious behavior, detect patterns and map potential criminal activity in real-time. AI-supported ML is, in effect, the new layer of preventative protection, the prowess of which can address the new surface layers of an attack made available by 5G. Cyberattacks on 5G will be software attacks and must be countered with software protections.

As a culture, we must not allow the newness of 5G to lull us into an anesthetized state of complacency. The reality is that the internet’s connection to people and the things they depend on will be increasingly established through potentially vulnerable 5G networks. The cyber community must address the raised stakes that threaten our national critical infrastructures. For companies and consumers alike, the responsibility to focus on vulnerabilities created by 5G is imperative in our efforts to thwart potential crippling attacks.

KEYWORDS: 5G cybersecurity information security risk management security vulnerabilities

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John mcclurg

John McClurg served as Sr. Vice President, CISO and Ambassador-At-Large in BlackBerry's/Cylance’s Office of Security & Trust. McClurg previously was CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell Laboratories; and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0921-cyber-Feat-slide1_900px.jpg

    Emerging technology, evolving threats — Part II: The asymmetry effect

    See More
  • SEC0821-cyber-Feat-slide1_900px

    Emerging technology, evolving threats — Part I: Quantum computing

    See More
  • Cyber tactics

    2023: The year for contextual cyber threat intelligence

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products

Events

View AllSubmit An Event
  • December 11, 2025

    Responding to Evolving Threats in Retail Environments

    Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing