SecurityGen has presented its latest research findings on GTP vulnerabilities in the paper – GTP vulnerabilities: A cause for concern in 5G and LTE networks. This research highlights how GTP is still vulnerable. And as GTP will continue to play a role in 5G networks given the interplay and integration of technologies, MNOS must become more aware about these threats and ensure proactive security measures for GTP protocol.
Download Security Whitepapers
Content Creation and Lead Generation Services
Accelerate Your Business Growth with TeckNexus: Compelling Content, Design, and Lead Generation Solutions for Results-driven Success. Partner with us to unlock your brand's potential and generate quality leads that fuel your success.
Security News and Insights
Experience the revolution in airport operations as Aena and Cellnex Telecom pilot a 5G private network at San Sebastian Airport, laying the groundwork for advanced applications, improved efficiency, and sustainable service.
The European Commission, in collaboration with EU Member States and ENISA, releases an update on the advancement of the EU Toolbox implementation on 5G cybersecurity. The report details the adoption of legislative measures by member states, the risks posed by specific 5G suppliers, and the importance of swift implementation to ensure robust cybersecurity
The latest Threat Intelligence Report from Nokia reveals a fivefold increase in IoT botnet DDoS traffic in the past year, putting numerous telecom network services at risk. This rise in attacks, originating from numerous insecure IoT devices, has primarily been driven by the Russia-Ukraine conflict and cybercriminal collectives.
Portugal’s cybersecurity council is set to issue regulations potentially barring telecom operators from utilizing Chinese equipment for their 5G mobile and 4G platforms. This move could have major implications for Chinese tech heavyweight Huawei and its ambitions in the Portuguese market.
Deutsche Telekom and Ericsson have developed a secure 5G network slicing that directly connects to a private cloud, addressing enterprise concerns over adopting edge use cases. The proof-of-concept has significant implications for the future of 5G technology, particularly around network slicing, with the potential to provide premium, revenue-generating services. However, security concerns persist, highlighting the need for careful management of network slices.
This article delves into the significance of security for operational technology in 5G use cases, as it pertains to industrial development, and highlights key considerations for ensuring optimal security measures are in place.
SecurityGen, the award-winning provider of security solutions and services for the telecom industry, has marked the end of Q1 2023 with a total of 40 operator customers in more than 20 countries plus the establishment of new teams in Latin America, South East Asia and the Middle East & Africa.
According to local media reports, the Spanish Ministry of Defence has launched several tenders with a total value of €50 million to install private 5G networks for the military. The move aims to enhance military capabilities and reduce the reliance on satellite communications.
DDoS attacks on the wireless telecommunications industry have grown by 79% since 2020, primarily due to the rise of 5G wireless home use. These attacks represented 20% of all DDoS attacks on a specific industry, second only to wired telecommunications carriers.
In response to the Secure 5G and Beyond Act of 2020, the federal government developed a four-pronged strategy for securing next-generation mobile telecommunications systems and infrastructure. One aspect of this strategy focuses on minimizing supply chain risks to U.S. economic and national security during the worldwide development and deployment of 5G infrastructure. The GSA was tasked with creating acquisition processes that facilitate secure 5G infrastructure for classified information requirements.
Betacom, along with its partners Axis Communications and Evolon Technology, has introduced an AI-powered perimeter surveillance solution called Betacom PSS. It offers round-the-clock physical threat detection for airports, warehouses, and manufacturing facilities, delivering results in a shorter time and at a reduced cost compared to traditional wired and public wireless solutions. Betacom PSS relies on Axis cameras equipped with Evolon’s AI-based image detection technology, all operating on Betacom’s managed private 4G/5G network.
Singtel announced that it is one of the world’s first to have 5G Security-as-a-Slice (SecaaS) as a capability, which proactively identifies and blocks cyber threats at the network level, thus preventing them from reaching the network’s users. According to a survey by Singtel among its customers in December 2022, nine out of 10 users expressed concern about security but only three had installed cybersecurity applications to protect their digital assets.
Realtime services and applications place new demands on overall network performance and reliability. As a result, mobile operators are under pressure to improve their networks to ensure a high-quality user experience supported by high service availability.
This Press Release highlights SecurityGen’s ambitious growth plans for the SEA region driven by SEA’s comprehensive and ambitious 5G rollout. Given the growth potential in the region, we are supplementing our commitment to this area with the relocation of our experts and developing local talent towards creating a dedicated research team within the geography. This move will reinforce our deep expertise in the telecom domain and our innovative solutions and services designed to help ensure secure 5G transitions for SEA-based MNOs. With our stack of carrier-grade telecom security solutions and deep expertise, we are excited to grow and deepen our engagements with leading MNOs in this region.
Adva Network Security today announced that its flagship 10Gbit/s edge solution with ConnectGuard(TM) Ethernet encryption has been approved for the transmission of classified data by the German Federal Office for Information Security (BSI).
While private mobile networks create new security considerations for enterprise security leaders, proactive measures can be taken to mitigate these risks and stay a step ahead. In this article, we provide the following areas to focus on in 2023 as private mobile network security earns a spot on the CISO priority list.
Indian mobile phone operators are expected to at least double their investments in network security, with the 5G rollout expected to spark a surge in network vulnerabilities, which assume critical importance, especially for enterprises
SecurityGen, the global security provider of telecom security solutions and services, unveils its new cutting-edge 5G Cyber Security Lab. This will empower mobile network operators to become knowledgeable about their 5G networks in order to protect them from digital threats. The lab serves as a beneficial tool for MNO teams who want to stay ahead with effective cyber defense strategies.
The 5G security integration with OneLayer prioritizes robust security and continuous operations for Druid Software’s clients, including system integrators and their private cellular networks.
Cybersecurity and telecom providers from around the world can now test their technologies and use cases in OneLayer’s digital twin private network environment
MITRE and the Department of Defense (DoD) launched FiGHT (5G Hierarchy of Threats), an adversarial threat model for 5G systems that empower organizations to reliably assess the confidentiality, integrity, and availability of 5G networks, as well as the devices and applications using them.
At a time when manufacturing facilities are increasingly implementing LTE and 5G networks, OneLayer addresses the need for enterprise-grade security ensuring organizations achieve the return on investment expected from their private networks
OneLayer teams up with Nokia and Cellcom to secure hundreds of doctors’ carts, patient beds, and medical devices connected via cellular networks.
The automotive industry is undergoing a revolutionary change towards software-defined vehicles, 5G connectivity, and autonomy. To cope with this change, the vehicle ecosystem has had to rapidly evolve, leading to the emergence of new potential attack surfaces and target methods. This article focuses on the landscape of vehicle attacks, challenges faced by the Auto OEMs, and the revolutionary approach taken by HARMAN where they build a safety net for customers through anomaly detection and attack prevention.
To compete safely at the speed of the cloud, telecom operators should evaluate industry best practices, collaboration, and innovation, setting the best security and privacy strategies based on individual regulatory and market contexts.
In today’s world, the network’s security is of prime importance. It’s on the top of the mind of everyone, be it the CEO, CSIO, the CTO, or the CMO. Moreover, it’s an important topic in all boardroom conversations as glitches in security will impact the brand.”
Public cellular networks have been around for years, and many security tools keep them running. Likewise, enterprise IoT networks are not new, and a wide variety of great security solutions have been developed to protect these networks. So why is a different security solution necessary for private cellular networks?
Can mobile operators use 5G to enhance security and monetize their networks at the same time? The answer is an emphatic Yes! 5G has functions such as NEF (Network Exposure Function) that expose the vast capabilities of Mobile Networks using standardized APIs. It allows mobile operators and private network operators to provide new services and monetize their networks.
The UK Government’s Department for Digital, Culture, Media and Sport (DCMS) is leading delivery of the Digital Connectivity Infrastructure Accelerator (DCIA) programme. This programme specifically addresses the challenges associated with the use of publicly owned infrastructure assets to support the roll out of advanced wireless connectivity.
The security paradigm has made significant evolution over the last couple of decades. When it comes to securing today’s ‘no-boundaries’ business applications, no assumptions, and zero trust.
Cyberattacks increasingly frequent, costly. The threats are staggering. On average, it takes more than 250 days to find and mitigate a network breach. Cyberattacks are up 92%, and the average data breach now costs $3.86 million,
As the manufacturing sector modernizes, facilities are increasingly reliant on IoT and connected devices. But, what are the security risks and challenges of private cellular networks for Industry 4.0? What are the differences from a security perspective between enterprise IP and private cellular networks? So, what should we do for a better tomorrow? What is the solution?