//////////////////////////////////////////////////////////////////////////
Security and Digital Time
ultra-low latency connectivity, and massive
networking – advance.
With the Digital Times, come also a new
era of endpoint attacks, especially for
weakly secured IoT devices. Cybercriminals
are quickly learning to leverage botnets,
orchestrate them and run very focused
and destructive attacks. And it’s not
just vulnerable IoT devices that are
ingress points, but also highly secured
smartphones that are now being targeted
at scale. “In the last three years, our Nokia Threat
Intelligence Center has recognised a scary
growth in smartphone attacks that malware
writers and scammers love to employ,” said
Vale. “In addition to the traditional SMS
Trojans, spy phone apps, banking Trojans,
information theft and ransomware, we are
now seeing bitcoin mining added to the
smartphone attack repertoire.”
Nokia’s recent Threat Intelligence Report
2019 has warned on the fast-growing
and evolving threat of malicious software
targeting Internet of Things (IoT) devices.
The report reveals that IoT botnet activity
represented 78% of malware detection
events in communication service provider
networks in 2018 – more than double the
rate seen in 2016, when IoT bot activity was
first seen in meaningful numbers. To address this, service providers and
enterprises must implement modern security
operations solutions capable to aggregate,
correlate and analyse data from disparate
point tools into cohesive and enriched
security intelligence with business-specific
context. An integrated security workflow
automation and orchestration are at the
heart of the transition from static defence to
agile and adaptive response.
IoT bots now make up 16% of infected
devices in CSP networks, up significantly
from 3.5% a year ago. Malware threats
against IoT devices could get worse
as consumer adoption of such devices
accelerate in the years ahead as 5G
capabilities – including extreme broadband, To address these challenges, Nokia proposes
its NetGuard, an award-winning suite of
integrated software modules providing
end-to-end Security, Orchestration, Analytics
and Response (SOAR). This industry-leading
software is powered by Machine Learning,
analytics and automation that provides
www.intelligentcio.com
FEATURE: MOBILE
extensive visibility and insight into the nature
of security threats, and drives intelligent,
automated responses.
Thus, while it is important for operators
to adopt Digital Transformation in Digital
Time, it is also equally important for them to
proactively address the security challenges. n
Henrique Vale, Head of Nokia Software for
MEA at Nokia
INTELLIGENTCIO
53