5G cell tower

New Government Strategy for 5G Security Sets Stage for Domestic Rollout

Franco Zaro of Valid breaks down new government efforts to establish a 5G security strategy and public paranoia about the wireless infrastructure.

Amid the constant stream of coronavirus updates, you may have missed some important developments in fifth-generation wireless infrastructure last month.

On March 23, President Donald Trump signed The Secure 5G and Beyond Act of 2020 – legislation which requires his administration to produce a 5G security strategy within 180 days of the law’s enactment.

That same week, the White House published the “National Strategy to Secure 5G of the United States,” a 7-page policy document addressing the administration’s plans to facilitate the domestic deployment of 5G, assess security risks and promote global development of the technology.

To understand more about government efforts to ensure secure 5G development and what it might mean for the burgeoning number of at-home workers during the COVID-19 pandemic, Security Today spoke with Franco Zaro, the director of business development for global technology provider Valid. Zaro also discussed public paranoia about the technology that has grown during the coronavirus crisis.

What is the importance of the new Secure 5G and Beyond Act? Why should Americans care about its enactment?

Although this enactment is about two years too late – as technology often evolves faster than political action – the 5G and Beyond Act will define how the U.S. builds the framework to implement the powerful omnipresent communication multichannel that is 5G. It will also lead how the U.S. implements upcoming technologies that will change the way we interact as a social ecosystem composed of both humans and machines.

What impact do you anticipate the law will have on the development and integration of 5G into American lives?

I believe that as it stands, having a bipartisan commission supported by leaders of different sectors (security, technology, science, transportation, etc.) will establish diverse participation, which will ensure 5G’s impact on American lives is implemented in a controlled manner. If both Republican and Democratic leaders are in agreement on the law, I think many misconceptions about the use of 5G can be changed. Particularly, American’s understanding of privacy and how 5G will create security while enabling systems to use Identity as the main entity.

How does the implementation of 5G affect the growing number of at-home workers and their use of IoT devices?

In the past five weeks, we have experienced an overwhelming necessity from several industries for a system that allows them to remotely monitor their production chain. Companies that have been resistant to change in the past are being forced to leave their comfort and adapt their way of production. As a result, these companies are realizing that big corporate offices are no longer a necessity as a remote office is far less expensive to maintain, along with several additional benefits.

According to BuzzFeed News, there has been a growing paranoia about 5G and even a conspiracy theory that the technology could "secretly be causing the COVID-19 outbreak." How do cybersecurity and technology experts combat the general public's misconceptions about 5G?

We are facing ‘times of change’ at many levels. Consider: new technology will be the driver of a connected and integrated world, giving people the ability to receive real-time data to support decisions or statements and the possibility to be efficient with our energy.

With the integration of 5G, I assume some areas of our society may look to keep the status quo in an effort to protect their own interests, and ‘fear of change’ will always generate paranoia or resistance. The same initial resistance happened with every step of the industrial revolution with steamers, mass production lines, automation and now with digital convergence. However, I am positive that our natural capacity to adapt as a society will prevail as it always has.

What are the security measures that you believe must be put in place for 5G's development and implementation? What policies do you hope government and private sector experts will keep in mind throughout that process?

Secure access to data is the main concern for how new technologies such as blockchain or biometrics will be able to help us. That being said, global guidelines are trying to explore the concept of privacy to ensure it is taken into serious consideration. It will be important for the U.S. to adopt an education system that ensures future generations are equipped to make the most of this new world and not dependent on more visionary countries – which is what is happening right now.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.