Cloud Security , Network Firewalls, Network Access Control , Security Operations

The Security and Regulatory Challenges of 5G

Security Officer for Axiata Shares Strategies for Securing 5G for Employees
Md. Mahbub Hasan, BISO, Axiata Group, Berhad

5G networks are different from previous generations of network technologies, which means they require a different kind of security and privacy tool, says Md. Mahbub Hasan, business information security officer for Axiata Group Berhad.

See Also: From CNAPP to CDR: The Cybersecurity Road Ahead

"Typically, there are two key concerns - technical and regulatory. We all know that 5G uses cloud infrastructure, which uses back-to-back hypervisor technologies and containerization technologies based on open-source solutions," Hasan says. "This has increased the threat ecosystem significantly."

The second challenge comes from regulators who are introducing stringent security and privacy requirements across the globe. "This has caused business leaders to focus on these requirements, especially in the broader telecom networks."

In this video interview with Information Security Media Group, Hasan also discusses:

  • Vulnerability management in 5G networks;
  • How to deal with challenges in 3G and 4G networks;
  • How to get more visibility of your attack surface.

Hasan is responsible for overseeing the Axiata Group's telecom security program. Prior to joining Axiata, he led information security at Robi Axiata.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.