The new capabilities made possible by new applications riding 5G networks hold tremendous promise. “As we pursue the connected future, however, we must place equivalent-if not greater-focus on the security of those connections, devices, and applications.” The adage “what’s everybody’s business is nobody’s business” has never been more appropriate-and dangerous-than in the quest for 5G cybersecurity. Never have the essential networks and services that define our lives, our economy, and our national security had so many participants, each reliant on the other-and none of which have the final responsibility for cybersecurity. Because of the cyber vulnerabilities of software, the tougher part of the real 5G “race” is to retool how we secure the most important network of the 21 st century and the ecosystem of devices and applications that sprout from that network. Because 5G is the conversion to a mostly all-software network, future upgrades will be software updates much like the current upgrades to your smartphone. 1ĥG will be a physical overhaul of our essential networks that will have decades-long impact. Borrowing on a philosophy Admiral Arleigh Burke coined in World War II: Speed is important, but speed without a good targeting solution can be disastrous. We must “fire first effectively” in our deployment of 5G. Professor, Pamplin College of Business - Virginia Techįormer Chief of Public Safety and Homeland Security Bureau - FCC
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |