Senators in the United States sponsored several bills that would pump over $1 billion in the development of 5G equipment to compete with China in the 5G race, now viewed as the new frontier in strategic domination.
Top Chinese telecom operators have jointly introduced a new 5G messaging service based on the GSMA RCS standard that seeks to replace WeChat, the popular Chinese messaging app.
In line with its aspiration of launching its 5G service in 2020, the American communications giant announced a variety of 5G devices that it will introduce in 2020 and its 5G service is already covering more than 30 U.S. cities.
5G networks are exciting and open the door to many new possibilities for IoT, however it also comes with security risks as manufacturers rush to dominate the new untapped market their devices.
Comprehensive protection in the 5G era requires a holistic approach to network security. This involves regular inspections, meticulous prioritization of threats, and systematic addressing of vulnerabilities.
5G technology plus 74 billion IoT devices estimated by 2025, it’s no surprise that IoT security is one of the top concerns keeping many executives up at night.
White House Unveils National Strategy for 5G Security Concurrently With Signing of the Secure 5G Act
The Trump Administration has released a national strategy for 5G security that will guide the government's approach to securing 5G networks, fulfilling the mandate of the Secure 5G and Beyond Act which was signed concurrently.
IoT market pushed by 5G connection is expected to grow fast and occupy $6.285 billion by 2025, the next shift will be to move users towards edge computing with devices getting stronger and cheaper to produce.
European Commission publishes joint risk assessment report on 5G security highlighting the need for a "new security paradigm" to ensure high level of cybersecurity preparedness.
Since 5G is not simply a faster version of 4G, but rather, an entirely new network architecture, it opens the door to entirely new security models for user privacy, identity management, and threat detection.