Close Menu
5gantennas.org5gantennas.org
  • Home
  • 5G
    • 5G Technology
  • 6G
  • AI
  • Data
    • Global 5G
  • Internet
  • WIFI
  • 5G Antennas
  • Legacy

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
5gantennas.org5gantennas.org
  • Home
  • 5G
    1. 5G Technology
    2. View All

    Deutsche Telekom to operate 12,500 5G antennas over 3.6 GHz band

    August 28, 2024

    URCA Releases Draft “Roadmap” for 5G Rollout in the Bahamas – Eye Witness News

    August 23, 2024

    Smart Launches Smart ZTE Blade A75 5G » YugaTech

    August 22, 2024

    5G Drone Integration Denmark – DRONELIFE

    August 21, 2024

    Hughes praises successful private 5G demo for U.S. Navy

    August 29, 2024

    GSA survey reveals 5G FWA has become “mainstream”

    August 29, 2024

    China Mobile expands 5G Advanced, Chunghwa Telecom enters Europe

    August 29, 2024

    Ateme and ORS Boost 5G Broadcast Capacity with “World’s First Trial of IP-Based Statmux over 5G Broadcast” | TV Tech

    August 29, 2024
  • 6G

    India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

    August 29, 2024

    Vodafonewatch Weekly: Rural 4G, Industrial 5G, 6G Patents | Weekly Briefing

    August 29, 2024

    Southeast Asia steps up efforts to build 6G standards

    August 29, 2024

    Energy efficiency as an inherent attribute of 6G networks

    August 29, 2024

    Finnish working group launches push for 6G technology

    August 28, 2024
  • AI

    Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

    August 29, 2024

    Why Honeywell is betting big on Gen AI

    August 29, 2024

    Ethically questionable or creative genius? How artists are engaging with AI in their work | Art and Design

    August 29, 2024

    “Elon Musk and Trump” arrested for burglary in disturbing AI video

    August 29, 2024

    Nvidia CFO says ‘enterprise AI wave’ has begun and Fortune 100 companies are leading the way

    August 29, 2024
  • Data
    1. Global 5G
    2. View All

    Global 5G Enterprise Market is expected to be valued at USD 34.4 Billion by 2032

    August 12, 2024

    Counterpoint predicts 5G will dominate the smartphone market in early 2024

    August 5, 2024

    Qualcomm’s new chipsets will power affordable 5G smartphones

    July 31, 2024

    Best Super Fast Download Companies — TradingView

    July 31, 2024

    Crypto Markets Rise on Strong US Economic Data

    August 29, 2024

    Microsoft approves construction of third section of Mount Pleasant data center campus

    August 29, 2024

    China has invested $6.1 billion in state-run data center projects over two years, with the “East Data, West Computing” initiative aimed at capitalizing on the country’s untapped land.

    August 29, 2024

    What is the size of the clinical data analysis solutions market?

    August 29, 2024
  • Internet

    NATO believes Russia poses a threat to Western internet and GPS services

    August 29, 2024

    Mpeppe grows fast, building traction among Internet computer owners

    August 29, 2024

    Internet Computer Whale Buys Mpeppe (MPEPE) at 340x ROI

    August 29, 2024

    Long-term internet computer investor adds PEPE rival to holdings

    August 29, 2024

    Biden-Harris Administration Approves Initial Internet for All Proposals in Mississippi and South Dakota

    August 29, 2024
  • WIFI

    4 Best Wi-Fi Mesh Networking Systems in 2024

    September 6, 2024

    Best WiFi deal: Save $200 on the Starlink Standard Kit AX

    August 29, 2024

    Sonos Roam 2 review | Good Housekeeping UK

    August 29, 2024

    Popular WiFi extender that eliminates dead zones in your home costs just $12

    August 29, 2024

    North American WiFi 6 Mesh Router Market Size, Share, Forecast, [2030] – அக்னி செய்திகள்

    August 29, 2024
  • 5G Antennas

    Nokia and Claro bring 5G to Argentina

    August 27, 2024

    Nokia expands FWA portfolio with new 5G devices – SatNews

    July 25, 2024

    Deutsche Telekom to operate 12,150 5G antennas over 3.6 GHz band

    July 24, 2024

    Vodafone and Ericsson develop a compact 5G antenna in Germany

    July 12, 2024

    Vodafone and Ericsson unveil new small antennas to power Germany’s 5G network

    July 11, 2024
  • Legacy
5gantennas.org5gantennas.org
Home»5G Technology»RSA CEO Rohit Ghai discusses the path forward for the new world of 5G cybersecurity
5G Technology

RSA CEO Rohit Ghai discusses the path forward for the new world of 5G cybersecurity

5gantennas.orgBy 5gantennas.orgMay 6, 2024No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


  • RSA CEO Rohit Ghai advises security services to verify the identity of users and the integrity of their devices.
  • Guy believes the intersection of 5G and AI is the most exciting area of ​​innovation.
  • This article is part of our series, “5G and the Connectivity Playbook,” which explores some of the most significant technological innovations of our time.

Thank you for subscribing!

Access your favorite topics on the go with your personalized feed.

By clicking “Sign Up”, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time by visiting your settings page or clicking “unsubscribe” at the bottom of our emails.

Bull

5G technology is on the way, it’s faster and more secure than ever before, and it’s creating a new world of cybersecurity.

“Most attackers look to attack new technologies because they have new technologies that haven’t been patched,” Rohit Ghai, CEO of security firm RSA, told Business Insider. “The last two years have seen a pretty dramatic focus on cybersecurity of critical networks.”

For example, to limit vulnerabilities and protect users accessing 5G networks with unmanaged devices, security services need to verify that the person using the device is who they say they are, and that the device hasn’t been compromised, Guy said.

“There’s a huge amount of intellectual property and corporate data stored on mobile devices,” Guy said. “Making sure that data isn’t compromised. From a 5G network perspective, that’s a huge vulnerability.”

Everyone can take basic steps to protect their accounts and devices, and Guy points to four recommendations from the Cybersecurity and Infrastructure Security Agency: recognizing and reporting phishing, using strong passwords, using multi-factor authentication and updating your software.

BI spoke with Guy ahead of the annual cybersecurity-focused RSA conference, which runs Monday through Thursday in San Francisco.

The following has been edited for clarity and length.

How has 5G and connectivity changed your business?

At the highest level, the change we’re focusing on is protecting enterprise IT networks since the advent of 5G. Two things have happened: There’s a new focus on the end device. Protecting and securing business workflows that run on end users’ mobile devices is a very new frontier enabled by 5G.

Secondly, threat actors are now targeting 5G. In the last 2-3 years, they have targeted critical infrastructure and industrial companies. These companies are investing more in cybersecurity, are more concerned about cybersecurity, and want to protect against threat actors.

Do you have any tips or advice for adding 5G and connectivity to your business?

We need to recognize that technology is a double-edged sword: with new capabilities comes the potential for bad actors to exploit new technology.

Whenever new technology is introduced, patching and updating must be ongoing, with security updates being applied promptly.

Another factor is identity: in the new 5G era networks, the perimeter is disappearing. Where there is no inside or outside, a zero trust strategy must be applied to cybersecurity.

What are the most exciting innovations and advancements in 5G today?

The most exciting area is the intersection of 5G and AI: One example is self-driving cars, which have intelligence and the ability to ask for and consult services that were not possible in the past.

As we said, this comes with a lot of risks. You need to ensure that all unmanaged 5G mobile devices are secured and not jailbroken or controlled. Any edge device, be it a phone or a car, can be compromised. Threat actors can take control and use it for malicious activities. They can use the mobile phone to access the corporate network and steal data.

If we can ask whether these endpoint devices have been compromised and answer that question in a very robust way, we can ensure that we can take advantage of 5G services.

What are the biggest trends in 5G cybersecurity?

The application of AI is a major trend. 5G networks are highly dynamic and constantly changing. Current approaches to security must be able to keep up with the dynamic nature of the network.

Another change is the use of identity and access governance to ensure privileged access to IT and OT. [operational technology] The network is controlled: Most cybersecurity attacks against critical infrastructure occur through compromised credentials.

What are the cybersecurity risks of 5G?

5G creates a massive edge network. In that respect, it expands the attack surface. If you think about a human network, if you have 100 employees, each employee is part of the attack surface. If you have a network and edge devices, the more devices you have, the larger the attack surface becomes. 5G expands the attack surface exponentially.

How are 5G attacks carried out?

Most attacks start with a compromised identity. This isn’t a new pattern. They get in somehow, then they move laterally to other computing devices in your network. They stay inside. They don’t attack right away. They actually hide, they move laterally from computer to computer. Then they go after your data, ransomware, whatever the target is.

The same pattern applies to 5G networks, they’re just exploiting different types of vulnerabilities and moving fast, with a focus on speed.

What does the future hold for 5G cybersecurity?

There is more and more cybersecurity intelligence that lives at the edge and determines if an edge device is secure, vulnerable, or under attack in some way. Moving that intelligence out of the central nervous system and into a more decentralized architecture is where the future of cybersecurity is headed.

Another change is the concept of passwordless.

Passwords are a very old type of feature that has been used in human networks for centuries. In 5G networks, we don’t need to start with a password-based solution where edge devices authenticate to the network using a password. Because 5G is a new technology, we need to start with a password-free approach. Passwords pose security issues and are complex to manage.

We are committed to implementing an industry standard called FIDO. [fast identity online]I think it has great potential for realizing a passwordless society.