top of page
  • Mariane Bunn

Securing the future: Cybersecurity in the 5G era

There is a big highway with big buildings on the background. Clearly a big city. The sky is dusty pink and you ave some kind of connection between the elements.

The 2024 RSA Conference in San Francisco highlighted the critical need for updated cybersecurity strategies as companies increasingly adopt 5G technology. This shift towards 5G, which includes both mobile devices and Internet of Things (IoT) technology, demands a fresh approach to securing networks and devices. Experts at the conference emphasized the importance of integrating cybersecurity measures from the onset of technology development, rather than as an afterthought.

Nathan Howe from Zscaler mentioned that 5G could potentially replace WiFi in various settings, necessitating a significant shift in cybersecurity thinking. The move towards private 5G networks is expected to transform connectivity across offices, factories, and campuses. Andrea Carcano of Nozomi Networks pointed out that considering cybersecurity during the development phase is more cost-effective than retrofitting security measures.

Key recommendations from cybersecurity professionals include conducting thorough security assessments of 5G devices, understanding what is connected to 5G networks, and holding vendors accountable for security. A zero-trust approach, where nothing is trusted by default and everything is verified, was highlighted as crucial for securing 5G networks. This approach helps narrow down potential impacts of any security breach by continuously validating and monitoring devices connected to the network.

Professionals also stressed the importance of having visibility into network traffic, analyzing risks, and considering the potential entry points for hackers. As 5G technology evolves, traditional cybersecurity practices may become obsolete, underscoring the need for companies to adopt new strategies and tools to protect against emerging threats. The conference underscored that as 5G expands the boundaries of connectivity, adopting a zero-trust network and staying vigilant against potential risks becomes imperative.


bottom of page