Security

News
Discover how Ericsson’s collaboration with OneLayer at the Global Utilities Innovation Center enhances security in private cellular networks for utilities.
News
Discover how Ericsson’s collaboration with OneLayer at the Global Utilities Innovation Center enhances security in private cellular networks for utilities.
Magazine
Explore the pivotal role of DSPs in 5G network security, addressing the challenges and strategies for a secure digital future in this comprehensive guide.
Magazine
Explore the pivotal role of DSPs in 5G network security, addressing the challenges and strategies for a secure digital future in this comprehensive guide.
News
Explore the transformative impact of the Biden-Harris Administration’s $42 million investment in Open RAN and wireless technology development through the Public Wireless Supply Chain Innovation Fund.
News
Explore the transformative impact of the Biden-Harris Administration’s $42 million investment in Open RAN and wireless technology development through the Public Wireless Supply Chain Innovation Fund.
News
Goughand Kelly, a leading provider of security products and services, has chosen Storm’s push-to-talk over cellular technologies for managing critical communications at large-scale events and music shows across the UK.
News
Goughand Kelly, a leading provider of security products and services, has chosen Storm’s push-to-talk over cellular technologies for managing critical communications at large-scale events and music shows across the UK.
Magazine
Explore how John Deere is systematically adopting private 5G networks, addressing challenges arising from rapid growth of industrial IoT and network limitations.
Magazine
Explore how John Deere is systematically adopting private 5G networks, addressing challenges arising from rapid growth of industrial IoT and network limitations.
News
This article delves into the recent Ericsson Mobility Report, highlighting the robust growth of 5G technology with predictions of over 5.3 billion subscriptions by 2029 and a significant increase in average data usage per smartphone.
News
This article delves into the recent Ericsson Mobility Report, highlighting the robust growth of 5G technology with predictions of over 5.3 billion subscriptions by 2029 and a significant increase in average data usage per smartphone.
Magazine
5G Non-Terrestrial Networks (NTN) promise a new horizon in global communication with high-speed, low-latency features. Yet, as they usher in this new era, they also introduce significant security and privacy challenges. Key vulnerabilities, such as signal jamming, spoofing, and eavesdropping, pose risks to data integrity and user privacy. Addressing these threats demands a layered approach, utilizing advanced cryptographic methods, intrusion detection systems, and innovative AI/ML techniques. As we navigate the future of 5G NTN, it’s crucial to prioritize user security and privacy, balancing the immense potential of these networks with the inherent risks they present.
Magazine
5G Non-Terrestrial Networks (NTN) promise a new horizon in global communication with high-speed, low-latency features. Yet, as they usher in this new era, they also introduce significant security and privacy challenges. Key vulnerabilities, such as signal jamming, spoofing, and eavesdropping, pose risks to data integrity and user privacy. Addressing these threats demands a layered approach, utilizing advanced cryptographic methods, intrusion detection systems, and innovative AI/ML techniques. As we navigate the future of 5G NTN, it’s crucial to prioritize user security and privacy, balancing the immense potential of these networks with the inherent risks they present.
News
SecurityGen has presented its latest research findings on GTP vulnerabilities in the paper – GTP vulnerabilities: A cause for concern in 5G and LTE networks. This research highlights how GTP is still vulnerable. And as GTP will continue to play a role in 5G networks given the interplay and integration of technologies, MNOS must become more aware about these threats and ensure proactive security measures for GTP protocol.
News
SecurityGen has presented its latest research findings on GTP vulnerabilities in the paper – GTP vulnerabilities: A cause for concern in 5G and LTE networks. This research highlights how GTP is still vulnerable. And as GTP will continue to play a role in 5G networks given the interplay and integration of technologies, MNOS must become more aware about these threats and ensure proactive security measures for GTP protocol.
Usecase
Experience the revolution in airport operations as Aena and Cellnex Telecom pilot a 5G private network at San Sebastian Airport, laying the groundwork for advanced applications, improved efficiency, and sustainable service.
Usecase
Experience the revolution in airport operations as Aena and Cellnex Telecom pilot a 5G private network at San Sebastian Airport, laying the groundwork for advanced applications, improved efficiency, and sustainable service.
News
The European Commission, in collaboration with EU Member States and ENISA, releases an update on the advancement of the EU Toolbox implementation on 5G cybersecurity. The report details the adoption of legislative measures by member states, the risks posed by specific 5G suppliers, and the importance of swift implementation to ensure robust cybersecurity
News
The European Commission, in collaboration with EU Member States and ENISA, releases an update on the advancement of the EU Toolbox implementation on 5G cybersecurity. The report details the adoption of legislative measures by member states, the risks posed by specific 5G suppliers, and the importance of swift implementation to ensure robust cybersecurity
News
The latest Threat Intelligence Report from Nokia reveals a fivefold increase in IoT botnet DDoS traffic in the past year, putting numerous telecom network services at risk. This rise in attacks, originating from numerous insecure IoT devices, has primarily been driven by the Russia-Ukraine conflict and cybercriminal collectives.
News
The latest Threat Intelligence Report from Nokia reveals a fivefold increase in IoT botnet DDoS traffic in the past year, putting numerous telecom network services at risk. This rise in attacks, originating from numerous insecure IoT devices, has primarily been driven by the Russia-Ukraine conflict and cybercriminal collectives.
News
Portugal’s cybersecurity council is set to issue regulations potentially barring telecom operators from utilizing Chinese equipment for their 5G mobile and 4G platforms. This move could have major implications for Chinese tech heavyweight Huawei and its ambitions in the Portuguese market.
News
Portugal’s cybersecurity council is set to issue regulations potentially barring telecom operators from utilizing Chinese equipment for their 5G mobile and 4G platforms. This move could have major implications for Chinese tech heavyweight Huawei and its ambitions in the Portuguese market.
News
Deutsche Telekom and Ericsson have developed a secure 5G network slicing that directly connects to a private cloud, addressing enterprise concerns over adopting edge use cases. The proof-of-concept has significant implications for the future of 5G technology, particularly around network slicing, with the potential to provide premium, revenue-generating services. However, security concerns persist, highlighting the need for careful management of network slices.
News
Deutsche Telekom and Ericsson have developed a secure 5G network slicing that directly connects to a private cloud, addressing enterprise concerns over adopting edge use cases. The proof-of-concept has significant implications for the future of 5G technology, particularly around network slicing, with the potential to provide premium, revenue-generating services. However, security concerns persist, highlighting the need for careful management of network slices.