article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Unfortunately, threat actors can also take advantage of 5G’s enhanced connectivity, executing network attacks faster than ever before. Hackers can spread malware via IoT networks, disrupt supply chains in development, and use a fleet of routers as an IoT botnet to launch a DDoS attack. Network Slice Compromise.

Risk 137
article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

For advantages, private blockchains are more scalable and energy-efficient with suggested use cases of banking and supply chain management. Security Paradigms: Traditional Networks vs. Blockchains. DDoS: Overwhelming the Network. KSI Innovator: Estonia’s Guardtime. Chronicled.

article thumbnail

Securing the Edge Ecosystem Global Research released – Complimentary report available

CyberSecurity Insiders

The results focus on common edge use cases in seven vertical industries – healthcare, retail, finance, manufacturing, energy and utilities, transportation, and U.S. SLED and delivers actionable advice for securing and connecting an edge ecosystem – including external trusted advisors.