Home Mobiles Huawei’s CSO Spills The Truth On 5G Technology and Cybersecurity Issues

Huawei’s CSO Spills The Truth On 5G Technology and Cybersecurity Issues

0
SHARE

Software companies that are based in the United States were banned from selling their software to Huawei earlier this year but what many people seem to forget is that this also happened in Australia. Huawei was banned in Australia last year and thanks to this, the Chinese tech giant is lacking 5G contracts for its next-generation technology. Not just that, but Huawei also lost a total of 100 employees in Australia after the ban.

Introducing 5G technology is the next step towards taking smartphones to the next level and Huawei has decided to make its case for why it should receive contracts in Australia with tech companies that can manufacturer 5G modem chips.

Huawei’s CSO Speaks Out

The reason why Huawei has been banned in the United States and Australia is because of a cybersecurity threat. David Soldani is the CSO (Cyber Security Officer) at Huawei and he recently decided to release a statement where he reveals that the world would actually be in more danger without Huawei having access to 5G technology.

“Blocking companies from certain countries does not make Australia any safer from cybersecurity issues. In fact, it just makes things worse because they are not addressing the real issues on cybersecurity,” stated the CSO.

6G Research

Huawei is not only interested in 5G technology, but the Chinese tech giant is also already working on research for 6G. Here is what David Soldani had to say on this matter:

“With the converge of management and control plane, AI will poses a significant impact on network security, as it might be exploited to launch more effective attacks, and in some scenarios, the security of AI systems is a matter of life and death,” he said.

“Unlike security vulnerabilities in traditional systems, the root cause of security weaknesses in machine learning systems lies in the lack of explainability, which leaves openings that can be exploited by adversarial machine learning methods such as evasion, poisoning, and backdoor attacks. Attackers may also implant backdoors in models and launch targeted attacks or extract model parameters or training data from query results,” added the CSO.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.