4 ways 5G will change your enterprise threat model

| March 3, 2020

article image
With 5G poised to become widely available across the globe, enterprise organizations need to seriously consider the security implications of deploying the technology. Over the next few years, 5G networks are expected to play a central role in enabling new digital transformation initiatives and in supporting new business use cases that are beyond the reach of current 4G-network technology. Driving much of that change will be 5G’s speeds of up to 1Gbps, its 1-millisecond latencies, and its support for up to about 100 times more connected devices per unit area compared to 4G.

Spotlight

SecuredTouch

SecuredTouch is a pioneer in behavioral biometrics for mobile, delivering continuous authentication technologies to strengthen security and reduce fraud while improving customers digital experience.

OTHER ARTICLES

Communications related vendor contracts start to pick up

Article | July 28, 2021

Publicly available announcements on all telecom contracts started to see a slowdown in 2nd quarter of 2019 and dipped in the 2nd quarter of 2020. We believe there might be several factors that could lead to the slowdown in 2019. In transport networking, operators are assessing new deployment models that include virtualization and disaggregated platform and in wireless segment, 4G rollout has reached maturity and started to see decline while 5G rollouts have just started and at an early phase of evaluation. And obviously at the end of 2019, we are seeing a more distinct slowdown likely from the impact of COVID-19 on global business deals. CSP has been more cautious with spending due to the challenges and uncertainties from the pandemic. However, dynamics related to COVID-19 have on the other hand accelerated bandwidth consumptions and subsequently driven investments across all segments of the network as we start to see recovery in the number of contracts announcement in the recent few quarters.

Read More

4 ways 5G will change your enterprise threat model

Article | March 3, 2020

With 5G poised to become widely available across the globe, enterprise organizations need to seriously consider the security implications of deploying the technology. Over the next few years, 5G networks are expected to play a central role in enabling new digital transformation initiatives and in supporting new business use cases that are beyond the reach of current 4G-network technology. Driving much of that change will be 5G’s speeds of up to 1Gbps, its 1-millisecond latencies, and its support for up to about 100 times more connected devices per unit area compared to 4G.

Read More

How safe is 5G really?

Article | February 19, 2020

The 5G era is about to arrive, to enable a host of new business applications. The next-generation cellular technology is designed , but 5G security is also much more complicated to manage. 5G poses an elevated security threat partly because there are more vectors through which adversaries can attack. The technology is set to enable a huge number of connected devices, collectively known as the ).

Read More

How a 5G coronavirus conspiracy spread across Europe

Article | April 16, 2020

At about 9.30pm on Easter Monday, in the small Dutch town of Almere near Amsterdam, the fire brigade was called to put out a blaze at a large telecoms mast—the second fire of its kind that night in the area. Though neither of the Almere towers were equipped with any of the latest 5G telecoms equipment—in fact one was designed only for use by the emergency services—authorities soon concluded that the fires were perpetrated by vandals acting in the name of an unusual theory: that 5G networks have contributed to the coronavirus pandemic.

Read More

Spotlight

SecuredTouch

SecuredTouch is a pioneer in behavioral biometrics for mobile, delivering continuous authentication technologies to strengthen security and reduce fraud while improving customers digital experience.

Events