5G Cybersecurity: Cloud to edge

Enterprises must consider both cloud and edge attack vectors in their resilience planning when it comes to 5G cybersecurity. Lee W. McKnight of Syracuse University will summarize advancements and enhancements for cybersecurity in 5G mobile networks, beginning by providing a clear understanding of what 5G is—an evolutionary step on the way to 6G—and how it differs from prior generations of cellular networks in architecture, bandwidth, and cyber-vulnerabilities.