Private Network Check Readiness - TeckNexus Solutions

European Commission calls for collaboration on 5G network infra security

The European Commission has invited government agencies, companies, and other enterprises to submit proposals for cybersecurity solutions to “protect, detect, defend and deter cyber-attacks” for 5G network infrastructure.
Security

The European Commission has invited government agencies, companies, and other enterprises to submit proposals for cybersecurity solutions for 5G network infrastructure.


The EC noted that investing 176.5 million euros ($181.2 million) worth of grants would improve the infrastructure and tools between the member states and the Commission for cybersecurity cooperation.

“The calls aim to strengthen the cybersecurity of the 5G network infrastructure by supporting secure services and by improving the testing and certification capabilities of tech solutions and services. The respective grants will also support the implementation of the new rules on cybersecurity of network and information systems (NIS2 Directive) into national legislation, as well as the capacity of Security Operations Centers across the EU to collect and share information on cyber incidents” the Commission said.

The aim of this initiative is to “protect, detect, defend and deter cyber-attacks” and “strengthen the cybersecurity resilience and capacity of the EU.” The call for proposals opens on February 15, 2023. Chinese vendors are mentioned as a potential concern in member countries’ decisions to move away from “high-risk vendors.” Politico reported that the European Union intends to reduce the risk posed by Chinese telecom equipment in the 5G networks.

“We are urging member states who have not yet imposed restrictions on high-risk suppliers to do that without delay, as a matter of urgency,” said Margrethe Vestager, executive vice president of the Commission in charge of digital issues, in a press conference.

In 2020, European Commission announced that EU member states had agreed on a set of mitigating measures to address security concerns raised by the deployment of 5G technology. The member states will proceed in a cooperative manner based on an objective assessment of the identified risks and effective measures.

The toolbox addressed all risks identified in the EU coordinated assessment, including the non-technical risks, such as interference from non-EU states or state-backed actors in the 5G supply chain.

Member states agreed to strengthen the security requirements, assess suppliers’ risk profiles, and apply restrictions for high-risk suppliers, including exclusions for the critical and sensitive assets (e.g. core network functions) and strategies for ensuring vendor diversification, in the toolbox conclusions. 

“The countries who have put the toolbox in use have done that differently, reflecting that there is a different legacy in different countries, which is exactly as we would expect,” said Vestager. “A number of countries have passed legislation but have not put it into effect. Passing legislation is good – making it work is even better.”


Recent Content

OneLayer is expanding into Latin America to address growing demand for private 5G and LTE security solutions. With successful deployments in mining and utilities, the company brings its expertise in Zero Trust, network orchestration, and cellular device visibility to regional markets like Brazil and Chile.
Lufthansa Industry Solutions and Ericsson are tackling logistics bottlenecks with private 5G. At the LAX warehouse, they replaced unreliable Wi-Fi with just two private 5G radios, reducing scanning delays by 97% and eliminating paper logs. With edge computing and AI-powered inspections, their scalable solution is setting a new standard for warehouse automation and logistics connectivity.
South Korea’s government and its three national carriers are aligning fresh capital to speed AI and semiconductor competitiveness and to anchor a private-led innovation flywheel. SK Telecom, KT, and LG Uplus will seed a new pool exceeding 300 billion won (about $219 million) via the Korea IT Fund (KIF) to back core and foundational AI, AI transformation (AX), and commercialization in ICT. KIF, formed in 2002 by the carriers, will receive 150 billion won in new commitments, matched by at least an equal amount from external fund managers. The platforms lifespan has been extended to 2040 to sustain long-cycle bets.
A new joint solution from Rohde & Schwarz (R&S) and the Taiwan Space Agency (TASA) consolidates electromagnetic compatibility (EMC) and antenna measurements into a single, production-grade test chamber, signaling a shift in how satellite payloads will be validated for Non-Terrestrial Network (NTN) and mission-critical services. By integrating both disciplines in one chamber, TASA can validate RF performance, emissions, and immunity under consistent test conditions and configurations, improving time-to-launch and de-risking interoperability with terrestrial networks. The TASA deployment combines R&S hardware, software, and engineering with a locally built Compact Antenna Test Range (CATR) reflector to achieve dual-mode EMC and antenna measurements in one chamber.
The Cellular Operators Association of India (COAI), representing Reliance Jio, Bharti Airtel, and Vodafone Idea, is pushing back against direct 5G spectrum allocation for enterprises. COAI argues that India’s urban coverage, revenue priorities, and national security risks make an operator-led model via spectrum leasing or network slicing, more viable. The Department of Telecommunications is reviewing TRAI’s recommendation, with the decision set to shape India’s private 5G market for years.
Rogers’ “Plus It Up” campaign combines upbeat family moments, the hit song Too Easy by Canadian indie artist Connor Price, and the promise of 5G+ connectivity. The TV ad emphasizes household savings with multi-line plans, nationwide coverage, and perks like exclusive entertainment access, all while spotlighting homegrown music talent.
Whitepaper
As VoLTE becomes the standard for voice communication, its rapid deployment exposes telecom networks to new security risks, especially in roaming scenarios. SecurityGen’s research uncovers key vulnerabilities like unauthorized access to IMS, SIP protocol threats, and lack of encryption. Learn how to strengthen VoLTE security with proactive measures such as...
Whitepaper
Dive into the comprehensive analysis of GTPu within 5G networks in our whitepaper, offering insights into its operational mechanics, strategic importance, and adaptation to the evolving landscape of cellular technologies....

It seems we can't find what you're looking for.

Download Magazine

With Subscription

Subscribe To Our Newsletter

Private Network Awards 2025 - TeckNexus
Scroll to Top

Private Network Awards

Recognizing excellence in 5G, LTE, CBRS, and connected industries. Nominate your project and gain industry-wide recognition.
Early Bird Deadline: Sept 5, 2025 | Final Deadline: Sept 30, 2025