How Do We Ensure the Security of What Comes After the 5G Revolution?

Security Intelligence | January 16, 2020

How Do We Ensure the Security of What Comes After the 5G Revolution?
2020 will see huge investments in 5G networks  Greensill estimated that the 5G rollout throughout the global supply chain will top $2.7 trillion by the end of the year. That’s not a number to sneeze at either, as it’s equal to roughly three percent of the world’s total gross domestic product. And while most of the investment will be in the infrastructure rollout, do not forget the other pieces. Hardware, software and services are also among the necessary investments. So, with all the endpoints we can expect to see, where does mobile security fit into all of this? It’s an excellent question, because how we handle mobile security during the 5G revolution will affect the development of 6G. 5G will bring a new set of issues related to data management, hardware integration, the near ubiquity of numerous new devices connected to networks and privacy. How we handle these issues will undoubtedly influence the future of networks.

Spotlight

Concern about cyber increasingly impacts all aspects of nuclear security, nuclear operations and nuclear thinking. The wide range of dynamics that fall under the cyber moniker are both changing and transforming the nature, capabilities and vulnerabilities of nuclear weapons, as well as the broader context within which security policy and warfare are conducted. This in turn has meant that states are wrestling with new issues of deterrence, arms control and stability as well as the safety, security and management of nuclear weapons and the future shape of the global nuclear order.

Spotlight

Concern about cyber increasingly impacts all aspects of nuclear security, nuclear operations and nuclear thinking. The wide range of dynamics that fall under the cyber moniker are both changing and transforming the nature, capabilities and vulnerabilities of nuclear weapons, as well as the broader context within which security policy and warfare are conducted. This in turn has meant that states are wrestling with new issues of deterrence, arms control and stability as well as the safety, security and management of nuclear weapons and the future shape of the global nuclear order.

Related News

SOFTWARE SECURITY

Mandiant Recognized as a Large Provider of Cyber Security Incident Response Services by Independent Research Firm

Mandiant | December 03, 2021

-Mandiant, Inc. the leader in dynamic cyber defense and response, today announced its inclusion in the new Forrester report “Now Tech: Cybersecurity Incident Response Services, Q4 2021.” The report provides an overview of 36 cyber security incident response vendors segmented by capabilities, size, vertical focus and geographic footprint. The purpose of the report is to help security leaders better understand the value organizations can expect from incident response vendors and make more informed procurement decisions. Since 2004, Mandiant has been at the forefront of cyber security and cyber threat intelligence, enabling a deep understanding of both existing and emerging threat actors, as well as their rapidly changing tactics, techniques and procedures. Its expertise derived from more than 200,000 hours responding to attacks per year as well as its proven track record of working on large and highly publicized incidents uniquely qualifies the company to assist clients with all aspects of an incident response—from technical response to crisis management. With Mandiant, organizations can confidently investigate and remediate incidents faster and more efficiently, allowing them to quickly get back to what matters most—their business. “In today’s ever-evolving threat environment, it’s not a question of if an organization will become a target of a cyber attack, but rather when,And with attacks becoming more sophisticated, speed to detection and remediation are key to ensuring business continuity. Mandiant services combined with our cyber security SaaS platform—Mandiant Advantage—enable early threat insights, ensuring our customers can quickly identify, respond to and defend against cyber threats.” Jurgen Kutscher, Executive Vice President, Service Delivery, Mandiant About Mandiant, Inc. Since 2004, Mandiant has been a trusted partner to security-conscious organizations. Effective security is based on the right combination of expertise, intelligence, and adaptive technology, and the Mandiant Advantage SaaS platform scales decades of frontline experience and industry-leading threat intelligence to deliver a range of dynamic cyber defense solutions. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats.

Read More

PLATFORM SECURITY

Anxinsec proposed a protection solution for advanced threats to defend against 0-day exploits and fileless attacks

Anxinsec | August 30, 2021

In the Beijing Cyber Security Conference 2021 from August 26th to 28th, Anxinsec was invited to attend along with more than 200 top domestic and international cyber security experts. During the conference, Anxinsec, a pioneer and leader in memory protection, presented a novel solution to prevent advanced threats. Recently, the world witnessed the rise of massive ransomware attacks, such as the SolarWinds attack or the Kaseya supply chain attack. These kinds of advanced threats are usually deliberate attempts by professional hacking organizations performing long-term infiltration strikes with the ultimate goal of destroying or stealing data in order to achieve a political or economic result. The rise of massive attacks have raised the alarm for the global cyber security defense system and proved that the current endpoint security isn't enough against today's advanced threats. Today's advanced threat happened in memory and kernel space are increasingly common. In May 2020, Google engineers counted 912 security flaws with high and critical levels in Chrome since 2015 and found that 70% were memory-level vulnerabilities. Microsoft security engineer said at the 2019 Israel Cyber Security Conference, 70% of the vulnerabilities fixed in Microsoft's products in the past 12 years are memory security flaws. With the growing trend of threat actors moving lower in the stack into hardware and firmware, 0-day vulnerability exploits and files attacks account for a large proportion of the prevailing attack methods today. These attacks are extremely destructive and less visible with the current EDR techniques. Chinese cyber security start-up Anxinsec provides a novel solution to this rising threat. Through implementing hardware virtualization technology, it lowers the line of defence from the application level to system and hardware level. The Anxinsec memory protection solution based on CPU instruction and memory set can effectively prevent the risk of data breaches and tampering at the memory level. Meanwhile, Anxinsec has a strong expert service team, can provide industry-leading security consulting, penetration testing, security maintenance, security operations and emergency response services. One of the main services the company provides in UAE is security expert service. Other services include enterprise mobility management (EMM), which includes mobile device management, mobile application lifecycle management, building enterprise mobile security framework, and unified endpoint management.

Read More

DATA SECURITY

CyberMDX and Alphatron Medical to Partner for Improving Data Security in Healthcare Sector Worlwide

CyberMDX | June 29, 2021

CyberMDX, a leading healthcare cybersecurity provider, works in delivering visibility and threat prevention for clinical networks and medical devices, and Alphatron Medical, has announced its partnership to support manage risks in cybersecurity and protect the workflow of data for customers of Alphatron Medical. Due to the augmented digitization of hospitals, Alphatron Medical offers data workflows, various IT solutions, and medical workwear, enabling professionals in healthcare to work comfortably and smoothly throughout the entire process of care. The company's integrated approach helps healthcare delivery organizations (HDOs) manage progressively complex healthcare IT environments of today. As it serves hospitals in the Netherlands, Belgium, and Germany, the solutions of Alphatron help maximize their customers’ IT systems and enable healthcare providers to concentrate more on caring for patients. Electronic personal health information (ePHI) value has dramatically increased cyber-attacks against healthcare organizations. As a result, it has underlined the criticality of cybersecurity as a constituent of any healthcare administration's IT strategy. The corporation will help progress the superiority of security for Alphatron's customers, using CyberMDX's Healthcare Security Suite to confirm the data security of Alphatron's data management solutions. CyberMDX's solution offers endpoint perceptibility, network threat deterrence, and functioning analytics to any linked medical, IT, or IoT devices. About CyberMDX CyberMDX, an IoT security leader, is dedicated to ensuring the quality of providing healthcare worldwide. CyberMDX offers cloud-based cybersecurity solutions that assist the progression of The IoT. The CyberMDX solution recognizes endpoints and judges susceptibilities to notice, respond to, and stop cyber occurrences. Deployed worldwide, CyberMDX is designed to integrate with our customers' existing environments through its easy-to-deploy, scalable, and agentless solution.

Read More