Network Security

Sponsored Channel

Download Security Whitepapers

Content Creation and Lead Generation Services

Accelerate Your Business Growth with TeckNexus: Compelling Content, Design, and Lead Generation Solutions for Results-driven Success. Partner with us to unlock your brand's potential and generate quality leads that fuel your success.

Security News and Insights

SecurityGen has presented its latest research findings on GTP vulnerabilities in the paper – GTP vulnerabilities: A cause for concern in 5G and LTE networks. This research highlights how GTP is still vulnerable. And as GTP will continue to play a role in 5G networks given the interplay and integration of technologies, MNOS must become more aware about these threats and ensure proactive security measures for GTP protocol.
The latest Threat Intelligence Report from Nokia reveals a fivefold increase in IoT botnet DDoS traffic in the past year, putting numerous telecom network services at risk. This rise in attacks, originating from numerous insecure IoT devices, has primarily been driven by the Russia-Ukraine conflict and cybercriminal collectives.
Deutsche Telekom and Ericsson have developed a secure 5G network slicing that directly connects to a private cloud, addressing enterprise concerns over adopting edge use cases. The proof-of-concept has significant implications for the future of 5G technology, particularly around network slicing, with the potential to provide premium, revenue-generating services. However, security concerns persist, highlighting the need for careful management of network slices.
In response to the Secure 5G and Beyond Act of 2020, the federal government developed a four-pronged strategy for securing next-generation mobile telecommunications systems and infrastructure. One aspect of this strategy focuses on minimizing supply chain risks to U.S. economic and national security during the worldwide development and deployment of 5G infrastructure. The GSA was tasked with creating acquisition processes that facilitate secure 5G infrastructure for classified information requirements.
Betacom, along with its partners Axis Communications and Evolon Technology, has introduced an AI-powered perimeter surveillance solution called Betacom PSS. It offers round-the-clock physical threat detection for airports, warehouses, and manufacturing facilities, delivering results in a shorter time and at a reduced cost compared to traditional wired and public wireless solutions. Betacom PSS relies on Axis cameras equipped with Evolon’s AI-based image detection technology, all operating on Betacom’s managed private 4G/5G network.
Singtel announced that it is one of the world’s first to have 5G Security-as-a-Slice (SecaaS) as a capability, which proactively identifies and blocks cyber threats at the network level, thus preventing them from reaching the network’s users. According to a survey by Singtel among its customers in December 2022, nine out of 10 users expressed concern about security but only three had installed cybersecurity applications to protect their digital assets.
This Press Release highlights SecurityGen’s ambitious growth plans for the SEA region driven by SEA’s comprehensive and ambitious 5G rollout. Given the growth potential in the region, we are supplementing our commitment to this area with the relocation of our experts and developing local talent towards creating a dedicated research team within the geography. This move will reinforce our deep expertise in the telecom domain and our innovative solutions and services designed to help ensure secure 5G transitions for SEA-based MNOs. With our stack of carrier-grade telecom security solutions and deep expertise, we are excited to grow and deepen our engagements with leading MNOs in this region.
While private mobile networks create new security considerations for enterprise security leaders, proactive measures can be taken to mitigate these risks and stay a step ahead. In this article, we provide the following areas to focus on in 2023 as private mobile network security earns a spot on the CISO priority list.
SecurityGen, the global security provider of telecom security solutions and services, unveils its new cutting-edge 5G Cyber Security Lab. This will empower mobile network operators to become knowledgeable about their 5G networks in order to protect them from digital threats. The lab serves as a beneficial tool for MNO teams who want to stay ahead with effective cyber defense strategies.
The automotive industry is undergoing a revolutionary change towards software-defined vehicles, 5G connectivity, and autonomy. To cope with this change, the vehicle ecosystem has had to rapidly evolve, leading to the emergence of new potential attack surfaces and target methods. This article focuses on the landscape of vehicle attacks, challenges faced by the Auto OEMs, and the revolutionary approach taken by HARMAN where they build a safety net for customers through anomaly detection and attack prevention.
In today’s world, the network’s security is of prime importance. It’s on the top of the mind of everyone, be it the CEO, CSIO, the CTO, or the CMO. Moreover, it’s an important topic in all boardroom conversations as glitches in security will impact the brand.”
Public cellular networks have been around for years, and many security tools keep them running. Likewise, enterprise IoT networks are not new, and a wide variety of great security solutions have been developed to protect these networks. So why is a different security solution necessary for private cellular networks?
Can mobile operators use 5G to enhance security and monetize their networks at the same time? The answer is an emphatic Yes! 5G has functions such as NEF (Network Exposure Function) that expose the vast capabilities of Mobile Networks using standardized APIs. It allows mobile operators and private network operators to provide new services and monetize their networks.
As the manufacturing sector modernizes, facilities are increasingly reliant on IoT and connected devices. But, what are the security risks and challenges of private cellular networks for Industry 4.0? What are the differences from a security perspective between enterprise IP and private cellular networks? So, what should we do for a better tomorrow? What is the solution?