How Do We Ensure the Security of What Comes After the 5G Revolution?

How Do We Ensure the Security of What Comes After the 5G Revolution?

2020 will see huge investments in 5G networks — Greensill estimated that the 5G rollout throughout the global supply chain will top $2.7 trillion by the end of the year. That’s not a number to sneeze at either, as it’s equal to roughly three percent of the world’s total gross domestic product. And while most of the investment will be in the infrastructure rollout, do not forget the other pieces. Hardware, software and services are also among the necessary investments.


So, with all the endpoints we can expect to see, where does mobile security fit into all of this? It’s an excellent question, because how we handle mobile security during the 5G revolution will affect the development of 6G. 5G will bring a new set of issues related to data management, hardware integration, the near ubiquity of numerous new devices connected to networks and privacy. How we handle these issues will undoubtedly influence the future of networks.


Is it too soon to talk about 6G? I’d argue it is not, as we have significantly shortened the time it takes to develop new groundbreaking technologies. Let’s theorize about what these new technologies could be, what the connectivity landscape could look like after the 5G revolution and, critically, how to ensure security in this new world.


A Packetless Internet


Despite the challenges, we may be at a point in our history where we can begin to rethink how our connectivity systems operate. Imagine having ..

Support the originator by clicking the read the rest link below.