Typography

5G is here - right now - and deployment has started. 5G chipsets are undergoing the last stages of manufacturing, and 5G devices are already available for testing.

Everyone agrees that 5G will create a massive data transaction on telcos’ networks due to the ultra-high speed, extra capacity and low latency provided by these networks, and will increase the number of connected devices in all categories from transport to automotive from banking to industrial, and any other service such health, utilities ,etc.

However, the most important thing is that transactions and data are secured in a way so that systems don’t crash and personal information isn’t hacked. Data privacy must be preserved.

Telecom Review has launched at the 12th edition of the Telecom Review Leaders’ Summit which was held on March 29th in Beirut, Lebanon a special edition about 5G and cybersecurity featuring exclusive interviews with the most influencing CTOs of the industry in North America, Europe and Asia, along with independent opinion features from research labs and universities.

This edition is online on all Telecom Review websites so don’t miss the chance to check what international industry leaders had to say about 5G and cybersecurity threats and solutions.