Enterprise Mobility Management / BYOD , Network Firewalls, Network Access Control , Network Performance Monitoring & Diagnostics

5G Networks: The New Security Challenges

Arm's Chet Babla on Headaches for CISOs
5G Networks: The New Security Challenges

As India moves from 4G to 5G mobile networks, it must be prepared to address new security challenges, says Chet Babla, a vice president at Arm, a chip and device manufacturer.

The move to 5G is converging with two other significant technology trends - the internet of things and artificial intelligence, Babla says in an interview with Information Security Media Group.

"It's the convergence of these three different technologies that is going to present some interesting challenges from the point of view of security," he says. "In the world of IoT and artificial intelligence ... we will have a new level of scale and impact as you start to see security threats and vulnerabilities exposed."

The move to 5G, Babla says, "is going to cause incredible headaches for [security] practitioners because of the scale of vulnerability that could be exploited."

Technical complexity in itself, Babla says, is not an approach to security. "You don't know how your device is really protected if you are just using complexity as your approach to security. So all enterprises, all IoT users and everyone looking to deploy 5G devices must go back to basics," he says. That means starting with an analysis of the use case and identification of potential threat vectors before devising mitigation strategies, he adds.

In this interview (see audio link below photo), Babla also discusses:

  • The security considerations to be kept in mind in a 5G network;
  • Why 5G poses more challenges for security practitioners;
  • Why security by obscurity is not the best way forward.

Babla is vice president of solutions at Arm. Previously, he worked at MediaTek, where he led the EMEA business development, sales and customer support teams. He has worked in the semiconductor industry for over 25 years, starting as an RF and analog IC designer and then moving on to product management and business development roles.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.