RSAC 2024: Customer Considerations for 5G Cellular Security

Donna Johnson, CMO at Cradlepoint and head of marketing for Ericsson Enterprise Wireless Solutions, joins Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss some of the current barriers to 5G cellular adoption.

Terry Sweeney, Contributing Editor

May 15, 2024

9 Min View
InformaTech

Donna Johnson, CMO at Cradlepoint and head of marketing for Ericsson Enterprise Wireless Solutions, joins Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss some of the current barriers to 5G cellular adoption. She weighs in on whether enterprises should view 5G as an expansion of their attack surface, as well as strategies that some companies are using to better protect themselves, including the use of secure access service edge (SASE) devices as one approach. Johnson also offers guidance on what questions 5G security customers should be asking themselves before deployments.

Donna Johnson is CMO at Cradlepoint and Ericsson Enterprise Wireless Solutions, driving go-to-market strategies for its portfolio of wireless WAN, private networks and security solutions. Throughout her career, Donna has worked with network management and infrastructure products, holding positions of engineering management, product management and product marketing at companies such as Talari Networks, Objective Systems Integrators and Dorado Software. Most recently, she was director of product marketing for NetScaler SD-WAN with Citrix.

About the Author

Terry Sweeney

Contributing Editor

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, Network World, InformationWeek and Mobile Sports Report.

In addition to information security, Sweeney has written extensively about cloud computing, wireless technologies, storage networking, and analytics. After watching successive waves of technological advancement, he still prefers to chronicle the actual application of these breakthroughs by businesses and public sector organizations.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights