Visualização normal

Antes de ontemStream principal
  • ✇Security | CIO
  • Cargill deploys private 5G to aid factory AI and automation efforts
    Connectivity at legacy facilities can present significant challenges for manufacturing companies seeking to optimize operations on the factory floor. To remedy that, food production giant Cargill is tapping private 5G as a means for unlocking new levels of automation across its extensive system of factories, including the introduction of AI-powered robots. NTT DATA’s private 5G network will provide the backbone for the company’s factory connectivity strategy, which w
     

Cargill deploys private 5G to aid factory AI and automation efforts

10 de Abril de 2026, 07:01

Connectivity at legacy facilities can present significant challenges for manufacturing companies seeking to optimize operations on the factory floor.

To remedy that, food production giant Cargill is tapping private 5G as a means for unlocking new levels of automation across its extensive system of factories, including the introduction of AI-powered robots.

NTT DATA’s private 5G network will provide the backbone for the company’s factory connectivity strategy, which was launched in March 2025 and covers 50 of its 1,100 facilities as of February 2026. The company plans to add private 5G to more than 100 sites per year.

The network provides Cargill with reliable, low-latency connectivity to smartphones and tablets on factory floors and has open the door to experiments with AI-powered robots, including its deployment of Boston Dymanics’ Spot at its Amsterdam facility to automate inspections. The four-legged robot checks for hazards such as overheating equipment and looks for ways to improve worker safety.

Spot roams the factory in a preset pattern and builds a database of information about the conditions it finds there, says Robert Greiner, Cargill’s director of platform engineering for customer, commercial, and business operations digital technology.

“It’ll do vibration tests, it’ll do air quality tests, it’ll do a whole bunch of different measures of what the plant should look like in normal conditions,” he adds. “Because it’s doing that same path every day, it then starts building a database of what normal looks like and what normal doesn’t look like.”

Cargill robotics on factory floor

Cargill

Cargill is exploring other ways to bring AI to its factory facilities, many of which are decades old, Greiner says. Reliable connectivity will enable the company to retrofit the buildings with modern sensors.

“Whether it’s a motor that turns or a mill, they generate heat, they have bearings, and they have failures,” he says. “5G has lit up a large area of those plants that didn’t have connectivity out there.”

More coverage

Cargill turned to NTT DATA and private 5G because of challenges with traditional Wi-Fi at many of its factories, Greiner says. In addition to covering a wider area than Wi-Fi routers, private 5G networking provides better connectivity through thick walls and other obstacles than public cellular networks, he notes.

“In the manufacturing environment, when you get outside of what I call a carpeted space, connectivity becomes an issue,” he adds. “Coming out of COVID, with Industry 4.0, there’s been a need for advanced connectivity out there in the plant floor, and our model was struggling to get that connectivity.”

Cargill can now deploy one private 5G network access point to cover the same area as about nine Wi-Fi access points.  And while private 5G assess points can cost more than Wi-Fi equipment, additional savings come during installation, with a 70% reduction in cabling and setup costs, Greiner says.

“In our environment we mostly have to run that cabling in conduits, and we have all that infrastructure cost that has to go into the factory floor to enable that access point toward the other side,” he says.

Meanwhile, private 5G gives the company more control over its networks than public cellular networks would, he adds.

“If you’re running on that public network and you’re in the middle of Nebraska, then the school lets out and the school bus pulls up next to the plant and every kid starts streaming data,” he says. “You’re relying on that connection to do some process, but that cell tower could be overrun by the school bus that just happens to be sitting there at that critical time.”

Pen and paper no more

Private 5G also will enable Cargill to update major software platforms and other apps in a secure and reliable way, Greiner says. The company has had several small warehouses sprinkled around the world with no connectivity, and private 5G deployments will allow them to install ERP systems.

“These dark warehouses didn’t have Wi-Fi in them, and they basically were using a No. 2 pencil and a yellow pad for keeping track of the inventory,” he says. “They’re moving to SAP, they have an inventory management system now, and they had the ability to switch over to an electronic inventory system, a warehousing system.”

Cargill took a smart approach to deploying private 5G by approaching it as foundational infrastructure rather than a single-use technology, says Parma Sandhu, vice president of enterprise 5G products and services at NTT.

“Instead of building networks for individual applications, the company deployed connectivity across facilities so multiple use cases — connected worker, robotics, sensors, inspections, and worker tools — can run on the same network,” Sandhu adds. “That approach allows new capabilities to be added over time without rebuilding the underlying connectivity.”

Private 5G can use several slices of the radio spectrum, and NTT DATA works with customers to find the best spectrum for their needs, Sandhu says. Connections can vary from sub-300Mbps to multigigabit speeds, depending on the spectrum used, but throughput isn’t the primary concern on most factory floors, he adds.

“In industrial environments, reliability and consistency matter more than peak speed,” Sandhu says. “Private 5G delivers high capacity and low latency, but the real advantage is secure, predictable connectivity across large facilities with thousands of connected devices. That reliability is what enables automation, robotics, and real-time monitoring on the factory floor.”

Private 5G is gaining traction in manufacturing as factories embrace generative AI, agentic AI, edge AI, and physical AI, Sandhu says. “There has been an explosion in demand for OT data, which requires more compute power and a faster, more reliable, and more secure connectivity,” he adds.

The factory use case

Private 5G makes sense in factory settings, says Jason Leigh, senior research manager for the mobility team at IT analyst firm IDC. While the gap is narrowing, private 5G has given factories more control over network performance than traditional Wi-Fi, and it is also built on a zero-trust security model, he adds.

“If you’re deploying a private network, you can pretty much tune it to say, ‘This network is always going to give me 100 megabits down, 50 megabits up,’” he says. “You can get a little better performance and control who comes on and off the network. “

While outsiders can access a Wi-Fi network if they have the password, private 5G can authenticate at the device SIM level, Leigh says. “It doesn’t matter if you have the password,” he adds.

Private 5G also has advantages as factories adopt more automation and other digital transformation initiatives, Leigh says. While smartphones and tablets running standard applications may not need a specialized network, technologies like AR and VR can benefit.

“Where it gets interesting is when you move towards more automation, more robotics,” he adds. “When you’re running a high-speed factory line and you’re using video to scan for quality issues, with private 5G, you can run that at high speed.”

AI-driven maintenance will need stable connections, he says. “You want that real-time super low-latency connection to exchange the image with the processing and back,” he adds. “You don’t want 10 minutes before the data processing to say, ‘This was an error in this problem, and the product should have been rejected.’”

  • ✇Security Intelligence
  • Taking the fight to the enemy: Cyber persistence strategy gains momentum Jonathan Reed
    The nature of cyber warfare has evolved rapidly over the last decade, forcing the world’s governments and industries to reimagine their cybersecurity strategies. While deterrence and reactive defenses once dominated the conversation, the emergence of cyber persistence — actively hunting down threats before they materialize — has become the new frontier. This shift, spearheaded by the United States and rapidly adopted by its allies, highlights the realization that defense alone is no longer enou
     

Taking the fight to the enemy: Cyber persistence strategy gains momentum

23 de Janeiro de 2025, 11:00

The nature of cyber warfare has evolved rapidly over the last decade, forcing the world’s governments and industries to reimagine their cybersecurity strategies. While deterrence and reactive defenses once dominated the conversation, the emergence of cyber persistence — actively hunting down threats before they materialize — has become the new frontier. This shift, spearheaded by the United States and rapidly adopted by its allies, highlights the realization that defense alone is no longer enough to secure cyberspace.

The momentum behind this proactive cyber strategy can be found in America’s Defend Forward initiative, the rise of cyber persistence among U.S. allies and the successful takedowns of infamous groups like LockBit ransomware. Meanwhile, the broader implications of this shift are revealed in the U.S. Department of State’s focus on digital solidarity in contrast to digital sovereignty.

Cyber persistence: A strategic pivot

The idea of cyber persistence, as opposed to cyber deterrence, is reshaping global cybersecurity efforts. Traditional deterrence theory, which aims to dissuade adversaries through the promise of retaliation, has failed to address the complexities of cyber criminal behavior. Malicious cyber actors, including state-sponsored entities and organized crime groups, continue to exploit vulnerabilities, which leads to critical infrastructure compromise, sensitive data theft and government or corporate network disruption.

In response, the U.S. Department of Defense 2023 Cyber Strategy reinforced the country’s commitment to “Defend Forward,” a proactive approach designed to directly disrupt adversaries’ operations. This strategy empowers cybersecurity forces to identify malicious activities before they escalate, track adversaries and take action to prevent or mitigate attacks. U.S. allies like the United Kingdom, Japan, Canada and the Netherlands have subsequently adopted similar strategies. They’ve all come to realize that cyberspace requires constant vigilance and operational persistence to stay ahead of evolving threats.

As the U.S. DoD outlines, engaging adversaries early in planning is essential to creating a more secure cyberspace. This involves tracking the capabilities and intentions of malicious actors and degrading their ability to act. Such a proactive stance requires cooperation, coordination and trust among allies. This is especially true since cyber campaigns often involve joint operations where one nation may invite another into its networks to assist in defense.

The shift from deterrence to persistent engagement

Increasingly, nations like the UK and the Netherlands are taking proactive measures to combat cyber threats by operationalizing cyber persistence. For example, the UK’s National Cyber Strategy highlights the importance of actively tackling adversaries’ cyber dependencies and emphasizing the need for persistent engagement in cyberspace. Further examples of this shift include Japan’s efforts to introduce active cyber defense and Canada’s participation in “Hunt Forward” operations. Both aim to actively search for and disarm malicious actors.

NATO has also acknowledged the necessity of a more proactive cyber stance. The 2022 NATO Strategic Concept recognizes that cyberspace is “contested at all times.” The document explicitly states that the cumulative effect of cyber activities could reach the level of an armed attack, potentially triggering NATO’s mutual defense obligations under Article 5. This signals the acceptance of cyber persistence as a critical aspect of national and collective security.

While deterrence remains a core strategy for nuclear and conventional warfare, it is becoming clear that in cyberspace, persistence — constantly identifying, mitigating and neutralizing threats — is critical to preventing large-scale cyber incidents.

Explore IBM X-Force Red offensive security services

The LockBit ransomware takedown: A case study in persistence

The February 2024 takedown of the LockBit ransomware group under Operation Cronos serves as a prime example of how persistent cyber strategies can effectively neutralize significant threats. LockBit, one of the most prolific Ransomware-as-a-Service (RaaS) groups, was responsible for approximately a quarter of all ransomware attacks in 2023. This included attacks on hospitals and other critical services during the COVID-19 pandemic.

Operation Cronos, a coordinated international effort, resulted in significant arrests, sanctions and the seizure of LockBit’s operational infrastructure. This was not just a technical takedown but a broader effort to undermine the group’s viability. Law enforcement agencies managed to access LockBit’s internal communications, expose its affiliates and disrupt its financial networks. This cumulative disruption severely damaged the group’s reputation, making it difficult for them to regain support within the cyber crime community.

While LockBit’s ringleader, known as “LockBitSupp,” has tried to claim the group’s resurgence, analysis shows that the law enforcement operation has had lasting effects. The exposure of the group’s inner workings has sowed distrust among affiliates, with many distancing themselves from the group. The takedown’s success demonstrates the power of cyber persistence, as it involved not only technical measures but also strategic psychological operations aimed at eroding the group’s support base.

Digital solidarity vs. digital sovereignty

At the heart of the United States’ international cyber strategy lies the concept of digital solidarity, which stands in stark contrast to the protectionist policies of digital sovereignty. Digital solidarity promotes collaboration and mutual support among nations, emphasizing the need for a secure, inclusive and resilient digital ecosystem. This strategy, unveiled in the U.S. Department of State’s 2024 International Cyberspace and Digital Policy Strategy, advocates for building international coalitions, aligning regulatory frameworks and fostering a free flow of data across borders.

The key pillars of digital solidarity include promoting an inclusive digital ecosystem, aligning governance approaches to data and advancing responsible state behavior in cyberspace. These efforts aim to ensure that all nations, especially emerging economies, have access to secure digital infrastructure and that global cooperation can thwart cyber threats through shared intelligence and mutual defense efforts.

In contrast, digital sovereignty emphasizes national control over digital infrastructure and data. Countries that adopt this stance seek to protect their digital assets by restricting foreign access to their markets and mandating data localization. While proponents argue that this approach can reduce dependence on foreign technology and enhance security, critics warn that it fragments the global digital ecosystem and makes it harder to respond collectively to cyber threats.

The tension between digital solidarity and digital sovereignty has significant implications for global cybersecurity. As the world’s digital infrastructure becomes more interconnected, the U.S. and its allies argue that collaboration, not isolation, is the key to addressing the complex cyber challenges of the future.

The future of proactive cyber defense

The shift from deterrence to persistence in cyberspace represents a new era of proactive cyber defense. By identifying vulnerabilities, disrupting adversaries’ operations and engaging in continuous cyber campaigns, the U.S. and its allies are reshaping the way nations approach cybersecurity.

Operations like the LockBit takedown underscore the effectiveness of this strategy. Plus, the emphasis on digital solidarity highlights the importance of international cooperation in creating a safer and more resilient digital ecosystem. As cyber threats continue to evolve, the persistence approach will likely become a cornerstone of modern cybersecurity. The goal is to ensure that nations can stay ahead of their adversaries and secure the future of cyberspace.

The post Taking the fight to the enemy: Cyber persistence strategy gains momentum appeared first on Security Intelligence.

❌
❌