From helpnetsecurity.com
The 5G race is on as carriers prepare for the onset of the next wireless generation in their own ways. While some have pseudo-definitions of 5G, others like Verizon and AT&T, are leading the 5G wars in a marketing-defined battle. Regardless of current status, the reality is that 5G will reach millions with nationwide and global launches giving rise to explosive connectivity growth.
A recent report from Cisco reminds us of the tremendous proliferation of the Internet of Things (IoT) connections and mobile-ready devices that we’ll see in response to 5G’s faster broadband (10 to 20 times faster than 4G). The report estimated 12 billion mobile-ready devices and IoT connections by 2022, compared to 9 billion in 2017. However, security is collateral damage in the wake of this growth because more IoT devices and better connectivity mean newer opportunities for security breaches.
With 5G potentially giving rise to additional threat vectors within carrier networks, Communication Service Providers (CSPs) are uniquely positioned to address IoT security issues, and according to Allot’s recent Telecom Trends Report, Closed Loop Automation (CLA) can help them solve this problem.