This conversation was based on Dr David Soldani's recent paper "6G Fundamentals: Vision and Enabling Technologies Towards Trustworthy Solutions and Resilient Systems”, which brings together an overall view of what a network in 6G might end up requiring and looking like. This video introduces a few of the ideas expressed in the paper, including the need to combine machine learning and machine cognition, and how a network that is designed to sense can also be better at protecting privacy.
You can read or download the whole paper in the ‘Latest Research’ section of 6GWorld.
This White Paper, the very first initiative in this domain, aims to identify aspects of security where the nature of edge computing leaves typical industry approaches to cloud security insufficient.
Edge computing environments are characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment and both HW and SW devices. Given this overall level of system heterogeneity, security, trust and privacy are key topics for the edge environments.
In this heterogeneous scenario, end-to-end MEC security considers the impact on the elements coming from all stakeholders involved in the system. The paper provides an overview of ETSI MEC standards and current support for security, also complemented by a description of other relevant standards in the domain (e.g. ETSI TC CYBER, ETSI ISG NFV, 3GPP SA3) and cybersecurity regulation potentially applicable to edge computing. The White Paper concludes on a general perspective of future evolutions and standard directions on MEC security.
Hard on the heels of an ABI Research report for 6GWorld, this on-demand webinar brings perspectives from ENISA, Trend Micro and ABI to explore where cybersecurity trends are leading us and how we can seize fresh opportunities.
The physical world of 2030 and beyond will be more networked, digitised and automated than ever before, depending on connectivity and AI to function. How do we make sure that bad actors cannot exploit this to endanger lives and economies?
Commissioned by 6GWorld, this ABI Research report maps out the interplay between security challenges and the evolution beyond 5G networks, including recommendations for action today and further reading.
In this Q&A conducted by 6GWorldTM, NanoLock Security CTO Nitzan Daube discusses the increasing number of smart cities and how one might address accompanying cyber threats. Is there a way to balance the needs for frequent, but cost-effective security updates in...
Smart cities had been booming before the pandemic, but it COVID-19 has nevertheless served as a catalyst, shifting priorities in the sector.
Artificial intelligence (AI) has many use cases, including cybersecurity. However, securing AI systems themselves has to be a priority.
Professor Daniel Mittleman explains how researchers will have to take new approaches to secure Terahertz frequencies in communications