Cloud Security , Network Firewalls, Network Access Control , Security Operations
The Security and Regulatory Challenges of 5GSecurity Officer for Axiata Shares Strategies for Securing 5G for Employees
5G networks are different from previous generations of network technologies, which means they require a different kind of security and privacy tool, says Md. Mahbub Hasan, business information security officer for Axiata Group Berhad.
See Also: Webinar | How the SASE Architecture Enables Remote Work
"Typically, there are two key concerns - technical and regulatory. We all know that 5G uses cloud infrastructure, which uses back-to-back hypervisor technologies and containerization technologies based on open-source solutions," Hasan says. "This has increased the threat ecosystem significantly."
The second challenge comes from regulators who are introducing stringent security and privacy requirements across the globe. "This has caused business leaders to focus on these requirements, especially in the broader telecom networks."
In this video interview with Information Security Media Group, Hasan also discusses:
- Vulnerability management in 5G networks;
- How to deal with challenges in 3G and 4G networks;
- How to get more visibility of your attack surface.
Hasan is responsible for overseeing the Axiata Group's telecom security program. Prior to joining Axiata, he led information security at Robi Axiata.