{"id":634,"date":"2021-06-21T13:36:44","date_gmt":"2021-06-21T13:36:44","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=634"},"modified":"2021-06-21T13:36:44","modified_gmt":"2021-06-21T13:36:44","slug":"secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/","title":{"rendered":"Secure by design: The role of 5G in defining long-term cybersecurity strategy"},"content":{"rendered":"<p>When it comes to the meteoric potential of 5G, we\u2019re well past the phase of conjecture, speculation, and prediction. 5G is well and truly here, bringing with it a wealth of opportunity for brands across the world \u2013 and we\u2019re already seeing its power in action as more cities and businesses embrace its inexorable rise.<\/p>\n<p>Yet, as with any technological innovation or evolution, inevitable questions will arise concerning its ability to safeguard against cybercrime.<\/p>\n<aside class=\"hawk-placeholder hawk-processed\" data-render-type=\"fte\" data-skip=\"dealsy\" data-widget-type=\"seasonal\" data-widget-id=\"3592579076186801700\" data-result=\"missing\"><\/aside>\n<p>Here, we look at the role 5G will play in shaping new security strategies, the steps CISOs can take to future-proof the security of their business, and what the new hybrid WFH\/office model will mean for 5G security design.<\/p>\n<h2 id=\"long-term-strategy-with-security-front-and-center\">Long-term strategy, with security front and center<\/h2>\n<p>When it comes to business strategy, cybersecurity has often played second fiddle to other core aspects. Say, for example, an organization is looking to break into another market within a certain time frame, the general attitude will be to establish a strategy that gets them there as quickly as possible, with optimization and security concerns left for a later date. Too often, security is bolted on last minute, as and when problems arise, which just isn\u2019t a long-term sustainable approach.<\/p>\n<p>What CISOs must consider is the arrival of 5G brings with it not just immense opportunity, but an entirely new attack surface for cybercriminals to exploit. It means that \u2013 for any new strategy, innovation, or product update \u2013 5G must sit at the very core. Strategy should be secure by design, and built around 5G, not the other way around.<\/p>\n<p>What\u2019s more, this isn\u2019t an issue that can be addressed with minor tweaks and alteration. True, we should use the foundations of 4G standards \u2013 and apply the lessons with learned operating within these environments \u2013 but it\u2019s critical that companies completely redefine their security strategies with 5G front and center.<\/p>\n<p>Source: IT Pro Portal<\/p>\n<p><a href=\"https:\/\/www.itproportal.com\/features\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/\">Read the Full Story Here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to the meteoric potential of 5G, we\u2019re well past the phase of conjecture, speculation, and prediction. 5G is well and truly here, bringing with it a wealth of opportunity for brands across the world \u2013 and we\u2019re already seeing its power in action as more cities and businesses embrace its inexorable rise. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":397,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-634","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Secure by design: The role of 5G in defining long-term cybersecurity strategy - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure by design: The role of 5G in defining long-term cybersecurity strategy - Community\" \/>\n<meta property=\"og:description\" content=\"When it comes to the meteoric potential of 5G, we\u2019re well past the phase of conjecture, speculation, and prediction. 5G is well and truly here, bringing with it a wealth of opportunity for brands across the world \u2013 and we\u2019re already seeing its power in action as more cities and businesses embrace its inexorable rise. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-21T13:36:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/11\/pexels-cottonbro-5483240-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1707\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/\",\"name\":\"Secure by design: The role of 5G in defining long-term cybersecurity strategy - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/11\/pexels-cottonbro-5483240-scaled.jpg\",\"datePublished\":\"2021-06-21T13:36:44+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/11\/pexels-cottonbro-5483240-scaled.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/11\/pexels-cottonbro-5483240-scaled.jpg\",\"width\":1707,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure by design: The role of 5G in defining long-term cybersecurity strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure by design: The role of 5G in defining long-term cybersecurity strategy - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/","og_locale":"en_US","og_type":"article","og_title":"Secure by design: The role of 5G in defining long-term cybersecurity strategy - Community","og_description":"When it comes to the meteoric potential of 5G, we\u2019re well past the phase of conjecture, speculation, and prediction. 5G is well and truly here, bringing with it a wealth of opportunity for brands across the world \u2013 and we\u2019re already seeing its power in action as more cities and businesses embrace its inexorable rise. [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2021-06-21T13:36:44+00:00","og_image":[{"width":1707,"height":2560,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/11\/pexels-cottonbro-5483240-scaled.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/","name":"Secure by design: The role of 5G in defining long-term cybersecurity strategy - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/11\/pexels-cottonbro-5483240-scaled.jpg","datePublished":"2021-06-21T13:36:44+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/11\/pexels-cottonbro-5483240-scaled.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/11\/pexels-cottonbro-5483240-scaled.jpg","width":1707,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/secure-by-design-the-role-of-5g-in-defining-long-term-cybersecurity-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"Secure by design: The role of 5G in defining long-term cybersecurity strategy"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=634"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/634\/revisions"}],"predecessor-version":[{"id":635,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/634\/revisions\/635"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/397"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}