SDxCentral
Join Login
SD-WAN 3 5G 10 Edge 9 IoT 4 SDN 5 NFV 6 Containers 10 Cloud 15 Security 8 AI 9 Data Center 4 Storage 4 APM/NPM 2 Open Source

Login to SDxCentral

Your login link has been emailed to you.

Or login with your password

Enter Your Password

Forgot your password? Login as a different user?
  • Newsletters
  • eBriefs
  • Podcasts
  • Webinars
  • Videos
  • Directory
  • White Papers
  • Resources
  • Use Cases
  • Support

Join SDxCentral and get information tailored to your particular interests everyday.

Join
Sponsored:
Dell EMC 7 Citrix Riverbed 1

Security Experts Shine a Spotlight on Automation, Managed Services at Mobile World Congress

Mobile Security Experts Shine a Spotlight on Automation, Managed Services at Mobile World Congress
Jessica Lyons Hardcastle
Jessica Lyons HardcastleFebruary 19, 2018
3:00 am MT

It’s the stuff of security professionals’ nightmares. The rise of 5G and the growing number of connected mobile and Internet of Things (IoT) devices means the mobile security threat landscape is larger than ever.

For this reason, mobile security promises to be a major topic at Mobile World Congress 2018, as security professionals and service providers share tips — and threat research — about how to best protect networks and users from cyberattacks.

Palo Alto Networks will host a panel on this topic, titled “Revolutionizing Mobile Network Security.” The panel, with A&T Assistant Vice President Rupesh Chokshi and Patrick Donegan, the principal analyst with HardenStance, will include a discussion on the growing threat landscape and the techniques needed to secure networks and devices.

Greg Day, VP and CSO of Palo Alto Networks, EMEA, will provide results of recent research from Unit 42, Palo Alto Networks’ threat research group.

Mobile Security Landscape

Day said Android is now the most common platform in the world. “That creates an interesting speculation,” he continued. “Will we see that overtake the traditional PC world for cyberattacks?”

While he doesn’t know the answer, one thing is certain: Hackers are taking their 30 years of finely-honed malware skills and moving their attacks to mobile devices.

He pointed to BankBot, a malicious Android app that imitates real banking applications to steal users’ login details.

Historically, cyberattacks have focused on credit card and online banking fraud. “So what does a criminal do? He takes a technique that has worked well with PCs and moves it into the mobile space for the obvious reasons: more smart phones and a lot of people using them for banking,” Day said.

Newer threats are more specific to how mobile technology is evolving. “One is using smart phones for espionage,” Day said. For example: using an executive’s mobile device to spy on him.”

Automation

Automation is another topic that we expect to hear a lot about at Mobile World Congress. It’s critical for service providers working to virtualize their networks and deploy 5G-enabled services. But when it comes to security, automation is a double-edged sword.

On one hand, automation is an essential tool for security operations centers bombarded by huge volumes of threats — and a shortage of skilled security professionals to deal with these threats, Donegan said.

“Use automation to deal with the vast majority of what are well-known, recognized threats,” Donegan said. “Take that workload off of the shoulders of security analysts and allow them to focus on threats that are really menacing and need detailed investigation.”

On the other hand, the bad guys use automation, too.

“We tend to think of automation as something that the defenders can do to protect the networks,” Donegan said. “But a large part of the threat is coming from attackers using automation to automate bot-based attacks. That is a fundamental threat.”

This threat is compounded by IoT device lack of security and sophisticated malware.

Managed Security Services

Donegan said he also expects to hear more telecommunications companies and vendors pushing managed security services at this year’s event.

“The operators need new sources of revenue, and the threats aren’t going away any time soon,” he said. “From a telco perspective, they have excellent reach into the enterprise, they have connectivity into the enterprise. They are already halfway there. They just need to offer compelling services and invest in people who can sell and deliver those services.”

Related Articles

A10-MWC-5G-v2-600x300
A10 Networks’ Yasir Liaqatullah Says Service Providers Must Modernize Their Networks to Prepare for 5G
Extreme Networks Moves Into Edge Device Security With Defender for IoT
Extreme Networks Moves Into Edge Device Security With Defender for IoT
SDxCentral's Weekly Roundup — February 15, 2019
SDxCentral's Weekly Roundup — January 11, 2019
Nokia Threat Report: IoT Botnets Skyrocketed in 2018 and 5G Will Make It Worse
Nokia Threat Report: IoT Botnets Skyrocketed in 2018 and 5G Will Make It Worse
Nokia’s Software Biz Is Firmly Rooted in Silicon Valley
Nokia’s Software Biz Is Firmly Rooted in Silicon Valley
Microsoft Spreads Open Enclave SDK Integrates With Azure IoT Edge
Microsoft Spreads Open Enclave SDK, Integrates With Azure IoT Edge
SDxCentral Daily News

Join your Peers! Subscribe to SDxCentral's Newsletter

Article Tags:

5G DevOps IoT Security

Jessica Lyons Hardcastle

About Jessica Lyons Hardcastle

Jessica is a Senior Editor, covering next-generation data centers, security, and software-defined storage at SDxCentral. She has worked as an editor and reporter for more than 15 years at a number of B2B publications including Environmental Leader, Energy Manager Today, Solar Novus Today and Silicon Valley Business Journal. Jessica is based in the Silicon Valley.

Have a story? Have a News Tip?

Send it to SDxCentral editors as editors@sdxcentral.com.

Leave a Reply Cancel reply

You must be logged in to post a comment.

Subscribe to Get the Daily News!

About SDxCentral

  • Newsletters
  • About Us
  • Contact Us
  • Work With Us
  • Editorial Team
  • Careers
  • Legal
  • Support

Engage With us

This material may not be copied, reproduced, or modified in whole or in part for any purpose except with express written permission from an authorized representative of SDxCentral, LLC. In addition to such written permission to copy, reproduce, or modify this document in whole or part, an acknowledgement of the authors of the document and all applicable portions of the copyright notice must be clearly referenced. All Rights Reserved.

© 2012-2019 SDxCentral, LLC, All Rights Reserved. SDNCentral™, the SDNCentral logo, SDxCentral™, SDxCentral logo, SDxNews™, SDxTech™, SDx™, the SDx logo, and DemoFriday™ are trademarks of SDxCentral, LLC in the U.S. and other countries.

  • Terms of Service
  • Privacy

Please enter your Business Email to view this asset:

We are requesting you provide a valid business, education, non-profit or government email address not from free or temporary email providers or ISPs. If you feel that our filters are incorrectly disallowing your email, please contact us at support@sdxcentral.com.