{"id":1019,"date":"2019-11-27T10:00:26","date_gmt":"2019-11-27T09:00:26","guid":{"rendered":"http:\/\/cmagazine.test\/5g-whats-in-it-for-security\/"},"modified":"2020-02-07T14:59:23","modified_gmt":"2020-02-07T13:59:23","slug":"5g-whats-in-it-for-security","status":"publish","type":"post","link":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/","title":{"rendered":"5G: what&#8217;s in it for security?"},"content":{"rendered":"<p>What is the perception of security in the brave new 5G world? We asked this question to some CxOs in the cybertech arena. The overall picture is that a large part of the companies is making <strong>small investments<\/strong> in the specific area, while some of them think of it as a <strong>coming soon business<\/strong> and are readier than the competition.<\/p>\n<p>This means that for a code master there is a very large space. <strong>IoT<\/strong> is the hottest place, but Industrial Control Systems could live a sudden change. And there is the need for trust.<\/p>\n<p>&#8220;5G is a net positive&#8221;, assures <strong>Rohit Ghai<\/strong>, RSA President; &#8220;Any new technology asks new questions and makes people wonder about it&#8221;. The speed increase and the new threat landscape brought in by 5G has a natural outcome: &#8220;we need to address issues at the network level.&#8221;<\/p>\n<p>There is much work to be done, but &#8220;our digital world deserves trust today.&#8221;<\/p>\n<p><center><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1067 hoverZoomLink\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/10\/RSA-Rohit-Ghai_sm-1024x890.jpg\" alt=\"\" width=\"1024\" height=\"890\" srcset=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/10\/RSA-Rohit-Ghai_sm-1024x890.jpg 777w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/10\/RSA-Rohit-Ghai_sm-1024x890-300x261.jpg 300w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/10\/RSA-Rohit-Ghai_sm-1024x890-768x667.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><br \/>\n<small>Rohit Ghai, RSA President<\/small><\/center><strong>5G communications create new opportunities, spaces, and services<\/strong>. Fortinet is ready for high transmission speed and all the other features; in particular, &#8220;we are working on <strong>latency<\/strong>&#8220;. Companies developing in-house specialized hardware have a very strong competitive asset: that&#8217;s why Cesare Radaelli, Fortinet Channel Manager, looks very proud when states &#8220;we have our Asics&#8221;.<\/p>\n<p>&#8220;Security is no longer the pursuit of attackers, but the rationalization center of corporate investments&#8221;, points out Gabriele Zanoni, Systems Engineer at FireEye.<\/p>\n<p>Fireye uses network sensors to check flows and simulate in-menu or innovative attacks to find out if the company needs a simple software tuning or more important investments.<\/p>\n<p>Multiple different solutions create a lack of homogeneity with low performance: &#8220;a careful analysis allows us to optimize the results and to verify if they are mapped on the business needs&#8221;.<\/p>\n<h2>Industry 4.0 and IoT<\/h2>\n<p>Security and automation are connected points for the future of the IoT, according to the vision shown by Claudio Squinzi, Country Sales Manager at CyberArk. &#8220;Looking at <strong>industry 4.0 in Italy<\/strong> you can see a rather tight knot: Industrial Control System, including SCADA systems, are very difficult to replace&#8221;. The automation vendor has such verticality that the lock-in often blocks everything. That&#8217;s where, most often, overnight revolutions happen.<\/p>\n<p>What sectors will succeed in 2020? On everything, <strong>Cloud<\/strong> and <strong>DevOps<\/strong> will continue to run. Thinking of security, anyway, &#8220;DevOps should be framed with a higher level that handles secrets (credentials) correctly&#8221;.<\/p>\n<p>&#8220;Talking about 5G, the number one concern is the <strong>number of devices<\/strong>; latency is important, but I&#8217;d put it in second place, along with speed&#8221;, fixes Marco Preuss is the German Head of Global Research &amp; Analysis Team (GReAT) in <strong>Kaspersky<\/strong>.<\/p>\n<p><center><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1069\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/10\/MarcoPreuss-Kaspersky.png\" alt=\"\" width=\"400\" height=\"400\" srcset=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/10\/MarcoPreuss-Kaspersky.png 400w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/10\/MarcoPreuss-Kaspersky-300x300.png 300w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/10\/MarcoPreuss-Kaspersky-150x150.png 150w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><br \/>\n<small>Marco Preuss, German Head of Global Research &amp; Analysis Team (GReAT) in Kaspersky<\/small><\/center>It&#8217;s easy: <strong>the higher the number of devices, the higher the number of cyberattacks<\/strong>. And IoT is set to ignite the number of connected devices to a point never imagined before. &#8220;Nobody talks about this, but <strong>the number of attacks in IoT is growing day by day<\/strong>: also a 1-room house will soon be impossible to manage by the persons living there if the IoT paradigm develops as we think of it&#8221;.<\/p>\n<p>It&#8217;s the digital age: new attacks, faster attacks. &#8220;Speed and latency need a solution at the <strong>physical network layer<\/strong>&#8220;.<\/p>\n<h2>What about IPv6?<\/h2>\n<p>Marco Preuss brought in the conversation a very important subject that ICT tends to keep in the backyard: the <strong>migration to IPv6<\/strong>. Without that walk, there will be no IoT at all.<\/p>\n<p>According to many analysts, the Internet of Things will interconnect tens of billions of devices. Using the Internet to connect them requires one network address for each device. The address field used in IPv4 is 32 bit large, so it can address roughly 4 billion devices.<\/p>\n<p>That&#8217;s the first reason why this protocol needed an update. The new version, namely IPv6, has an address field 128 bit wide, to address more than 3&#215;10^38 addresses; 340 undecillions, to be precise. Whoever knew the word &#8220;undecillion&#8221; before IPv6 please raise his hand!<\/p>\n<p>Let&#8217;s tell an old story, in very short.<\/p>\n<h2>What happened to IPv5?<\/h2>\n<p>The first interconnection inside ArpaNET dates 1969, so at the end of 2019 the time machine says &#8220;50 years&#8221;. The Internet adopted the Internet Protocol version 4 (IPv4) in 1981, and publicly implemented it a few years later.<\/p>\n<p>The incredible success of the public Internet in the &#8217;90s asked for a complete revision of the protocol. The Internet Engineering Task Force, i.e. the protocol developers, completed the new version, IPv6, in 1998.<\/p>\n<p>But what happened to IPv5? Well, it never existed!<\/p>\n<p>The Internet Stream Protocol, or ST, was a companion standard to IPv4 developed in the &#8217;70s and released first in 1979 (ST), then revised in 1990 (ST2), and finally upgraded to ST2+ in 1995. ST2+, published as <a href=\"https:\/\/tools.ietf.org\/html\/rfc1819\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">RFC1819<\/a>, calls its own packets with an Internet Protocol version number 5. The purpose of the stream protocol was not to improve the Internet protocol but to help streaming media to flow over the internet, so it became the foundation for Voice over IP and other technologies.<\/p>\n<p>ST2+ was never called IPv5. To avoid any name problems, however, the new version of the Internet protocol after version 4, or IPv4, was labeled version 6, or IPv6.<\/p>\n<p>Let&#8217;s go back to our IoT quandaries. &#8220;A huge problem will be the <strong>full compliance to IPv6<\/strong>&#8220;, anticipates Marco Kreuss, &#8220;still not 100% there&#8221;. Only a few percentage points are currently running on IPv6 systems. The new standard is incompatible with the old one, so still many systems run both stacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is the perception of security in the brave new 5G world? We asked this question to some CxOs in the cybertech arena. The overall picture is that a large part of the companies is making small investments in the specific area, while some of them think of it as a coming soon business and&#8230; <a class=\"more-link\" href=\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/\">Read more<\/a><\/p>\n","protected":false},"author":8,"featured_media":957,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_uag_custom_page_level_css":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[],"tags":[4268,38],"collections":[],"class_list":{"0":"post-1019","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"tag-5g","8":"tag-security-manager","9":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>5G: what&#039;s in it for security? - Codemotion Magazine<\/title>\n<meta name=\"description\" content=\"The introduction of 5G will arise new challanges for cybersecurity managers and network experts: more information in this article!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5G: what&#039;s in it for security?\" \/>\n<meta property=\"og:description\" content=\"The introduction of 5G will arise new challanges for cybersecurity managers and network experts: more information in this article!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Codemotion Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Codemotion.Italy\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-27T09:00:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-07T13:59:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1084\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leo Sorge\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:site\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leo Sorge\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/\"},\"author\":{\"name\":\"Leo Sorge\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/99fe84861e17797989e16094aac727d5\"},\"headline\":\"5G: what&#8217;s in it for security?\",\"datePublished\":\"2019-11-27T09:00:26+00:00\",\"dateModified\":\"2020-02-07T13:59:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/\"},\"wordCount\":915,\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920.jpg\",\"keywords\":[\"5G\",\"Security Manager\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/\",\"name\":\"5G: what's in it for security? - Codemotion Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920.jpg\",\"datePublished\":\"2019-11-27T09:00:26+00:00\",\"dateModified\":\"2020-02-07T13:59:23+00:00\",\"description\":\"The introduction of 5G will arise new challanges for cybersecurity managers and network experts: more information in this article!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/#primaryimage\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920.jpg\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920.jpg\",\"width\":1084,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Manager\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/tag\/security-manager\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"5G: what&#8217;s in it for security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"name\":\"Codemotion Magazine\",\"description\":\"We code the future. Together\",\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\",\"name\":\"Codemotion\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"width\":225,\"height\":225,\"caption\":\"Codemotion\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Codemotion.Italy\/\",\"https:\/\/x.com\/CodemotionIT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/99fe84861e17797989e16094aac727d5\",\"name\":\"Leo Sorge\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/60ef89012822fdaeb014dc2b17dcc78c3a835e1dfe86ede053fa46a91926fd29?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/60ef89012822fdaeb014dc2b17dcc78c3a835e1dfe86ede053fa46a91926fd29?s=96&d=mm&r=g\",\"caption\":\"Leo Sorge\"},\"description\":\"I hold a degree in electronics. I talk and write about science and technology in both real and close-to-real worlds since 1976. I frankly believe that business plan and singularity are excellent starts for science-fiction stories.\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/author\/leo-sorge\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"5G: what's in it for security? - Codemotion Magazine","description":"The introduction of 5G will arise new challanges for cybersecurity managers and network experts: more information in this article!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/","og_locale":"en_US","og_type":"article","og_title":"5G: what's in it for security?","og_description":"The introduction of 5G will arise new challanges for cybersecurity managers and network experts: more information in this article!","og_url":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/","og_site_name":"Codemotion Magazine","article_publisher":"https:\/\/www.facebook.com\/Codemotion.Italy\/","article_published_time":"2019-11-27T09:00:26+00:00","article_modified_time":"2020-02-07T13:59:23+00:00","og_image":[{"width":1084,"height":675,"url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920.jpg","type":"image\/jpeg"}],"author":"Leo Sorge","twitter_card":"summary_large_image","twitter_creator":"@CodemotionIT","twitter_site":"@CodemotionIT","twitter_misc":{"Written by":"Leo Sorge","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/#article","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/"},"author":{"name":"Leo Sorge","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/99fe84861e17797989e16094aac727d5"},"headline":"5G: what&#8217;s in it for security?","datePublished":"2019-11-27T09:00:26+00:00","dateModified":"2020-02-07T13:59:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/"},"wordCount":915,"publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920.jpg","keywords":["5G","Security Manager"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/","url":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/","name":"5G: what's in it for security? - Codemotion Magazine","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/#primaryimage"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920.jpg","datePublished":"2019-11-27T09:00:26+00:00","dateModified":"2020-02-07T13:59:23+00:00","description":"The introduction of 5G will arise new challanges for cybersecurity managers and network experts: more information in this article!","breadcrumb":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/#primaryimage","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920.jpg","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920.jpg","width":1084,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/5g-whats-in-it-for-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codemotion.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Security Manager","item":"https:\/\/www.codemotion.com\/magazine\/tag\/security-manager\/"},{"@type":"ListItem","position":3,"name":"5G: what&#8217;s in it for security?"}]},{"@type":"WebSite","@id":"https:\/\/www.codemotion.com\/magazine\/#website","url":"https:\/\/www.codemotion.com\/magazine\/","name":"Codemotion Magazine","description":"We code the future. Together","publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codemotion.com\/magazine\/#organization","name":"Codemotion","url":"https:\/\/www.codemotion.com\/magazine\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","width":225,"height":225,"caption":"Codemotion"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Codemotion.Italy\/","https:\/\/x.com\/CodemotionIT"]},{"@type":"Person","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/99fe84861e17797989e16094aac727d5","name":"Leo Sorge","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/60ef89012822fdaeb014dc2b17dcc78c3a835e1dfe86ede053fa46a91926fd29?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/60ef89012822fdaeb014dc2b17dcc78c3a835e1dfe86ede053fa46a91926fd29?s=96&d=mm&r=g","caption":"Leo Sorge"},"description":"I hold a degree in electronics. I talk and write about science and technology in both real and close-to-real worlds since 1976. I frankly believe that business plan and singularity are excellent starts for science-fiction stories.","url":"https:\/\/www.codemotion.com\/magazine\/author\/leo-sorge\/"}]}},"featured_image_src":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920-600x400.jpg","featured_image_src_square":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920-600x600.jpg","author_info":{"display_name":"Leo Sorge","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/leo-sorge\/"},"uagb_featured_image_src":{"full":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920.jpg",1084,675,false],"thumbnail":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920-150x150.jpg",150,150,true],"medium":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920-300x187.jpg",300,187,true],"medium_large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920-768x478.jpg",768,478,true],"large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920-1024x638.jpg",1024,638,true],"1536x1536":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920.jpg",1084,675,false],"2048x2048":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920.jpg",1084,675,false],"small-home-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920.jpg",100,62,false],"sidebar-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920-180x128.jpg",180,128,true],"genesis-singular-images":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920-896x504.jpg",896,504,true],"archive-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920-400x225.jpg",400,225,true],"gb-block-post-grid-landscape":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920-600x400.jpg",600,400,true],"gb-block-post-grid-square":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/09\/accessibility-3570138_1920-600x600.jpg",600,600,true]},"uagb_author_info":{"display_name":"Leo Sorge","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/leo-sorge\/"},"uagb_comment_info":0,"uagb_excerpt":"What is the perception of security in the brave new 5G world? We asked this question to some CxOs in the cybertech arena. The overall picture is that a large part of the companies is making small investments in the specific area, while some of them think of it as a coming soon business and&#8230;&hellip;","lang":"en","_links":{"self":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/1019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/comments?post=1019"}],"version-history":[{"count":5,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/1019\/revisions"}],"predecessor-version":[{"id":3710,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/1019\/revisions\/3710"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media\/957"}],"wp:attachment":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media?parent=1019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/categories?post=1019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/tags?post=1019"},{"taxonomy":"collections","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/collections?post=1019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}