European Commission calls for collaboration on 5G network infra security

The European Commission has invited government agencies, companies, and other enterprises to submit proposals for cybersecurity solutions to โ€œprotect, detect, defend and deter cyber-attacksโ€ for 5G network infrastructure.
Security

The European Commission has invited government agencies, companies, and other enterprises to submit proposals for cybersecurity solutions for 5G network infrastructure.


The EC noted that investing 176.5 million euros ($181.2 million) worth of grants would improve the infrastructure and tools between the member states and the Commission for cybersecurity cooperation.

โ€œThe calls aim to strengthen the cybersecurity of the 5G network infrastructure by supporting secure services and by improving the testing and certification capabilities of tech solutions and services. The respective grants will also support the implementation of the new rules on cybersecurity of network and information systems (NIS2 Directive) into national legislation, as well as the capacity of Security Operations Centers across the EU to collect and share information on cyber incidentsโ€ย the Commissionย said.

The aim of this initiative is to โ€œprotect, detect, defend and deter cyber-attacksโ€ and โ€œstrengthen the cybersecurity resilience and capacity of the EU.โ€ The call for proposals opens on February 15, 2023. Chinese vendors are mentioned as a potential concern in member countries’ decisions to move away from โ€œhigh-risk vendors.โ€ย Politico reported that the European Union intends to reduce the risk posed by Chinese telecom equipment in the 5G networks.

โ€œWe are urging member states who have not yet imposed restrictions on high-risk suppliers to do that without delay, as a matter of urgency,โ€ said Margrethe Vestager, executive vice president of the Commission in charge of digital issues, in a press conference.

In 2020, European Commission announced that EU member states had agreed on a set of mitigating measures to address security concerns raised by the deployment of 5G technology. The member states will proceed in a cooperative manner based on an objective assessment of the identified risks and effective measures.

The toolbox addressed all risks identified in the EU coordinated assessment, including the non-technical risks, such as interference from non-EU states or state-backed actors in the 5G supply chain.

Member states agreed to strengthen the security requirements, assess suppliers’ risk profiles, and apply restrictions for high-risk suppliers, including exclusions for the critical and sensitive assets (e.g. core network functions) and strategies for ensuring vendor diversification, in the toolbox conclusions.ย 

โ€œThe countries who have put the toolbox in use have done that differently, reflecting that there is a different legacy in different countries, which is exactly as we would expect,โ€ said Vestager. โ€œA number of countries have passed legislation but have not put it into effect. Passing legislation is good โ€“ making it work is even better.โ€


Recent Content

Airtel has acquired 400 MHz of 26 GHz mmWave spectrum from Adani Data Networks, a move that strengthens its high-speed 5G offerings in urban and enterprise zones. The deal enhances Airtelโ€™s ability to scale fixed wireless access, industrial 5G networks, and high-bandwidth consumer services. With India’s spectrum demand surging, this acquisition underscores the critical role of efficient spectrum use and signals a new phase of telecom consolidation.
ETSI has published its first ISAC report for 6Gโ€”ETSI GR ISC 001โ€”highlighting 18 use cases across healthcare, public safety, automation, and mobility. The report dives into deployment scenarios, sensing modalities, and KPIs like fine motion accuracy and sensing latency. It also outlines security, privacy, and sustainability guidelines for real-world ISAC integration into 6G networks.
In 2025, 5G surpasses 2.25 billion global connections, marking a pivotal shift toward mainstream adoption. While North America leads in performance and per capita usage, challenges in spectrum policy and enterprise integration remain. This in-depth report from 5G Americas explores the rise of Standalone 5G, the promise of 5G-Advanced, the reality of private network deployments, and the need for smart, forward-looking spectrum strategy.
Low-code platforms like VC4’s Service2Create (S2C) are transforming telecom operations by accelerating service delivery, reducing manual tasks, and simplifying integration with legacy systems. Discover how this technology drives digital transformation, improves efficiency, and future-proofs telecom networks.
Nokia, Digita, and CoreGo have partnered to roll out private 5G networks and edge computing solutions at high-traffic event venues. Using Nokia’s Digital Automation Cloud (DAC) and CoreGoโ€™s payment and access tech, the trio delivers real-time data flow, reliable connectivity, and enhanced guest experience across Finland and international locationsโ€”serving over 2 million attendees to date.
AI Pulse: Telecomโ€™s Next Frontier is a definitive guide to how AI is reshaping the telecom landscape โ€” strategically, structurally, and commercially. Spanning over 130 pages, this MWC 2025 special edition explores AIโ€™s growing maturity in telecom, offering a comprehensive look at the technologies and trends driving transformation.

Explore strategic AI pillarsโ€”from AI Ops and Edge AI to LLMs, AI-as-a-Service, and governanceโ€”and learn how telcos are building AI-native architectures and monetization models. Discover insights from 30+ global CxOs, unpacking shifts in leadership thinking around purpose, innovation, and competitive advantage.

The edition also examines connected industries at the intersection of Private 5G, AI, and Satelliteโ€”fueling transformation in smart manufacturing, mobility, fintech, ports, sports, and more. From fan engagement to digital finance, from smart cities to the industrial metaverse, this is the roadmap to telecomโ€™s next eraโ€”where intelligence is the new infrastructure, and telcos become the enablers of everything connected.
Whitepaper
As VoLTE becomes the standard for voice communication, its rapid deployment exposes telecom networks to new security risks, especially in roaming scenarios. SecurityGenโ€™s research uncovers key vulnerabilities like unauthorized access to IMS, SIP protocol threats, and lack of encryption. Learn how to strengthen VoLTE security with proactive measures such as...
Whitepaper
Dive into the comprehensive analysis of GTPu within 5G networks in our whitepaper, offering insights into its operational mechanics, strategic importance, and adaptation to the evolving landscape of cellular technologies....

It seems we can't find what you're looking for.

Download Magazine

With Subscription

Subscribe To Our Newsletter

Scroll to Top