Fujitsu: Cyber cretins are casing out private 5G
Japan’s Fujitsu is inking a partnership with the US-Japanese cybersecurity giant Trend Micro and it’s all around cybersecurity and private 5G.
Fujitsu and Trend Micro’s cooperation will kick off with a simulated smart factory environment, and an operational Fujitsu one.
It sports a whirring menagerie of high-definition monitoring cameras and automatic guided vehicles. This simulated smart factory lives at the Fujitsu Collaboration Lab in Kawasaki, a city otherwise known for its Ninja-branded motorcycles. Their field trial will last until September, and if it all goes well, say the two companies, they may look to release a commercial private 5G security solution.
Trend Micro’s approach is twofold: embed endpoint security in each IoT device’s SIM card in each IoT device, and then do network security for the private 5G system as a whole.
The hacking possibilities are infinite
Fujitsu and Trend Micro’s reasons for partnering up around private 5G cybersecurity are pretty twofold, too.
First, stealing your secrets, blackmailing you or sabotaging your factories are pretty strong motives for cybercriminals. And second, its factories that are often going to set up 5G first, usually private 5G. Private networks often cobble together a vast number of different products and architectures.
Cyber gangs will be eyeing these up carefully for targets for signaling storms, IoT devices that can be infected and turned into bots, and insider attacks. So you can start to see why Fujitsu might think private 5g is a strong area to polish up its cybersecurity wares.
To read the complete article, visit Light Reading.