Can your organization's information security program become a market differentiator for your brand?
Verizon must be betting that it is.
This week, the company made a significant announcement about the 5G network it is rolling out, and that announcement focused on security.
The company rolled out a new whitepaper on its 5G network security and how the company claims to be a standout in the space.
Srini Kalapala, Vice President of Network Planning for Verizon, sums it up like this:
"In all aspects of our network, from the core of the network, to the radio access edge, even to the customer device, we have built our network to be secure.
From design, to implementation, to deployment the 5G network, built on the foundation of the best 4G security, is the gold-standard in the industry. We will not compromise when it comes to the security of our network and that of our customers' data."
While 5G itself is new and emerging, Verizon says it is already looking to the future of threats for the technology.
It lists four steps it is taking to "future-proof" its technology.
Leveraging confidentiality and integrity of data at the network's core:
"Understanding the criticality of both the confidentiality and integrity of data, Verizon is working with Guardtime and WWT to provide near real-time, non-repudiated evidence of tampering in a machine’s state while also providing meaningful reductions in time between a machine’s compromise and its detection.
If a security breach or incident occurs, it is critical to be able to quickly identify changes in data. With the amount of data stored in systems today, identifying breaches in data integrity can be a time consuming and onerous task. Verizon engineers and our vendors are using cryptographically secure functions to create digital fingerprints of data and store them in a blockchain so they cannot be modified."
Secure Credentialing Management System (SCMS) for Connected Vehicles:
"Connected vehicles need to connect to each other, to roadside infrastructure, to other road users and to cloud-based services. SCMS is the fundamental mechanism to ensure those connections are protected against attacks on integrity, confidentiality, and repudiation. The SCMS provides digitally signed certificates and activation codes that are used to validate vehicle safety messages."
Read the new white paper here: First Principles for Securing 5G
Let's see if other companies make as big of a deal around 5G security as they do their individual roll-outs.