Creating A Secure 5G Service Based Architecture: Part 2 - API Security
In our previous blog on 5G SBA security, we looked at the key capabilities for effective 5G security and examined what this means for vulnerability management. In this blog, we’ll look at Web Application and API Security (WAAS) to repel service based interface (SBI) abuse.
As a reminder, in the first blog, we identified the key capabilities for effective 5G security, which include:...