Di Bello, vice president, strategic development, OpenText
2020 will be a key year for mobile device security given new demands placed on these devices. While employees and consumers have started to take a more proactive approach when it comes to cyber security over the past few years, there is still more that can be done around mobile devices. Organizations have enjoyed the multiple benefits of BYOD, and employees desire even more business functionality on their devices – but the implications for security are enormous. Fortunately, as the concept of the network perimeter has changed with the rapid adoption of cloud and mobile technologies, attitudes towards security have shifted. Businesses now realize that breaches – including breaches involving mobile devices - are inevitable. Businesses must embrace a solution that provides security without compromising privacy or functionality. As the concept of a network perimeter further dissolves over the coming years, the enterprise especially will need to re-shape security strategy to account for the flexibility we are extending our work force. It’s time to acknowledge a simple fact, you can’t protect what you can’t see.
Lanowitz, head of evangelism, AT&T Cybersecurity
Shared responsibility for 5G security will emerge: While 5G networks are designed with security, organizations need to understand the risk this new technology presents from an expanded attack surface due to the proliferation of IoT devices. In order to combat these challenges, a 5G shared responsibility security model will likely emerge in 2020 (similar to the approach with public cloud). ()
G to drive Botnet DDoS attacks. 2020 will be the year of 5G, bringing with it not only faster speeds and bandwidth capabilities to our mobile devices, but also making them highly coveted targets by DDoS attackers. While mobile devices have always been targeted by financial or personal data thieves, 5G's increased bandwidth allows attackers to take control over a relatively small number of mobile handsets and unleash a tremendous amount of damage. A potential DDoS attack may be distributed via an innocent-looking app on the Play or App store and an attacker just needs a few hundred installs to create a massive outbreak.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.