111 The Roll Out of 5G 5G means more than just access to 1080p Twitch streams while you’re on the go (have you checked out lara6683? She’s awesome). Advanced AI in devices, combined with cloud computing and now edge computing, will lead to the creation of a distributed computing environment connecting billions of devices and leading to a new generation of consumer and business applications. The International Telecommunications Union (ITU) divides 5G’s use cases into three main categories: · Enhanced Mobile Broadband (eMBB) · Massive Machine-Type Communications (mMTC) · Ultra-Reliable and Low-Latency Communications (URLLC) The first of those (eMBB) will give you faster access to cat videos, but the other two are worth mentioning as well! At the micro level, mMTC will extend the Internet of Things to a massive number of new devices, supporting roughly ten times as many devices in an area than are presently supported. At a more macro level, URLLC will allow for “mission-critical” communications, enabling industrial automation, drone control, new medical applications, and autonomous vehicles. By the end of 2020, most countries around the world will have some form of limited access to 5G, and half of the United States is expected to have access. Considering the number of cities in the United States that currently have access is… barely more than 20… that means this is going to be a fast rollout. With speeds increasing by 10-20x, and the number of connected devices rapidly proliferating, the implications for our daily lives could be massive. However, some serious cybersecurity concerns remain. With the multiplication of connected devices, there will be an even greater number of vulnerabilities under threat from bad actors. At the same time, SecOps teams will find themselves inundated with a flood of data, as the proliferation of devices compounds the number of connections exponentially. Combine the sheer increase in volume along with a dramatic boost in speed, and it becomes clear that cybersecurity teams will need to increasingly rely on software such as SOAR platforms, which orchestrate and automate responses to security events. Through the usage of such platforms, SecOps teams will be able to proactively program playbooks to respond to events, allowing analysts to turn their high-level knowledge into automated routines relieving them of the mundane – and increasingly impossible – job of providing triage to every event or threat that comes through. Conclusion I know how much we in the tech community love to speculate on the future. My fingers are crossed that the singularity is near, and I, for one, welcome our new Skynet overlords. But as much fun as such speculations are, our cybersecurity practices, unfortunately, need to be a bit more grounded. These three issues are not far flung, they are not Jules Verne, they are not Heinlein, Asimov, Dick, or Herbert – these are concerns we need to focus on now, these are happening in 2020.
112 I mean, if you want to be able to afford nanotech immortality, you’ll need to at least keep your job for a few more years, right? About the Author Dan Cole, Director of Product Management at ThreatConnect, has spent the last decade as a product manager working to create awesome software that gets to the core of solving the unique problems faced by a myriad of industry verticals. From large financial and insurance providers, to global telecom carriers, to federal agencies, Dan believes that the right software can free companies and users to focus on and enable their key missions. Learn more about Dan and visit him online at https://threatconnect.com/.
- Page 1 and 2:
1 8 Most Common Cybersecurity Mista
- Page 3 and 4:
2
- Page 5 and 6:
4 The Internet Got Safer In 2019: A
- Page 7 and 8:
@CYBERDEFENSEMAG CYBER DEFENSE eMAG
- Page 9 and 10:
8
- Page 11 and 12:
10
- Page 13 and 14:
12
- Page 15 and 16:
14
- Page 17 and 18:
16
- Page 19 and 20:
18
- Page 21 and 22:
20 8 Most Common Cybersecurity Mist
- Page 23 and 24:
22 You can prevent (or decrease) th
- Page 25 and 26:
24 While it’s not feasible to res
- Page 27 and 28:
26 The major difference is the addi
- Page 29 and 30:
28 Oh, my! PerCSoft’s Irony By Ch
- Page 31 and 32:
30 • Conduct cybersecurity traini
- Page 33 and 34:
32 Persistent Cybersecurity Industr
- Page 35 and 36:
34 Automation is welcome and seen a
- Page 37 and 38:
36 Protecting Against Modern Cybera
- Page 39 and 40:
38 Conclusion Unfortunately, no tec
- Page 41 and 42:
40 For 2020 The Death of Traditiona
- Page 43 and 44:
42 The Next Five Years The End of E
- Page 45 and 46:
44 Government Agencies Are Prime Ta
- Page 47 and 48:
46 It’s a basic fact of contempor
- Page 49 and 50:
48 simpler way to approach these pr
- Page 51 and 52:
50 Why Outsmart Cyber Attackers Whe
- Page 53 and 54:
52 Depending on how you look at it,
- Page 55 and 56:
54 devices. Russian actors can extr
- Page 57 and 58:
56 How to Become a Cybersecurity Sl
- Page 59 and 60:
58 industry. Perform online searche
- Page 61 and 62: 60 The Security Challenges of Robot
- Page 63 and 64: 62 The typical approach in providin
- Page 65 and 66: 64 The Blockchain And Wireless Tech
- Page 67 and 68: 66 systems. As is quite well-known,
- Page 69 and 70: 68 Benefits of Having an SSL Certif
- Page 71 and 72: 70 Google has made SSL compulsory s
- Page 73 and 74: 72 This year, privacy and security
- Page 75 and 76: 74 The Perspectives Of The 5th Indu
- Page 77 and 78: 76 The balance between offense and
- Page 79 and 80: 78 The Rise of Cybercrime-As-A-Serv
- Page 81 and 82: 80 About the Author Mark Belgrove i
- Page 83 and 84: 82 the conflict. Practically, it’
- Page 85 and 86: 84 fact is something that would see
- Page 87 and 88: 86 Furthermore, Tessian in 2019 del
- Page 89 and 90: 88 Automatic for The SOC People How
- Page 91 and 92: 90 Allows Transparency and Drive Le
- Page 93 and 94: 92 Only large enterprises can benef
- Page 95 and 96: 94 The Growing Costs of Cyber Attac
- Page 97 and 98: 96 After suffering a cyber attack m
- Page 99 and 100: 98 Some of the most damaging Inside
- Page 101 and 102: 100 Out-Smarting the Cybersecurity
- Page 103 and 104: 102 Empower Other Teams Network and
- Page 105 and 106: 104 New Security Report Highlights
- Page 107 and 108: 106 The Threat Lab team also analyz
- Page 109 and 110: 108 Drive, AWS, Office 365, etc. It
- Page 111: 110 former governor, this bill also
- Page 115 and 116: 114 Is It Safe to Connect to Public
- Page 117 and 118: 116 5. Safe Browsing Additional dil
- Page 119 and 120: 118 flawed method in which Evernote
- Page 121 and 122: 120 Really, Imagine a Day Without W
- Page 123 and 124: 122
- Page 125 and 126: 124
- Page 127 and 128: 126
- Page 129 and 130: 128
- Page 131 and 132: 130
- Page 133 and 134: 132
- Page 135 and 136: 134
- Page 137 and 138: 136
- Page 139 and 140: 138 Meet Our Publisher: Gary S. Mil
- Page 141 and 142: 140 Free Monthly Cyber Defense eMag
- Page 143 and 144: 142
- Page 145 and 146: 144
- Page 147 and 148: 146 Nearly 8 Years in The Making…
- Page 149 and 150: 148
- Page 151: 150