Video

TRUST TALKS: VIDEO SERIES ON CYBER & TELECOMS SECURITY!

The Convergence of Enterprise and Telco Security with 5G

Welcome to Enea AdaptiveMobile Security’s video series of conversations on cybersecurity in the telecoms sector. Hosted by HardenStance security analyst, Patrick Donegan, and featuring experts in 5G network security, signalling and mobile messaging security.

TOPIC OF THE DAY

The convergence of enterprise and telco security with 5G

What can the telecoms sector learn from cyber security best practices such as the ones conducted by leading banks, transport, logistics and other businesses? How should the requirements of enterprise customers buying network slices impact telco security best practice? This discussion will explore how telecom security needs to evolve beyond just implementing new 3GPP 5G specs.

TOPIC OF THE DAY

Spam gangs attacking UK networks, the MEF and more

In the third segment of the series… Spammers arrested in the UK; Metro Ethernet Forum (MEF) is becoming a leading cyber security Standards Development Organization (SDO); Singtel considers selling Trustwave and more.

FAQ

Why 5G requires new approaches to cybersecurity?

5G enables many new use cases, for which technologies like service-based architecture, virtualization and slicing are needed. The merging of these technologies into the existing telecommunications infrastructure brings new challenges, as existing infrastructure must be integrated and interoperability with partners has to be provided. These new technologies also bring their own security risks and vulnerabilities within them. 5G security needs to combine the best of IT security with the specifics of telecommunication protocols to provide a secure and reliable service.

What are the main security risks of 5G technology for telcos?

5G is a new technology and very complex. Therefore, many new security risks will be introduced. In addition, the main feature of 5G is to bring in new applications and partners and provide them with dedicated 5G network slices for their use cases. Bringing in new partners requires enhanced security features like partner-specific access control for the core network, monitoring & logging for signaling and data plane, Service Level Agreement enforcement. 
As 5G core networks are only now being deployed, it is difficult to estimate the main risks exactly, but due to the information richness of the 5G network, data leakage and theft should be considered a significant risk. Other potential risks include fraud, malware/ransomware, denial of service (DoS)location tracking, and others. 

Related insights

AAA & Access Management – Scale up for the New Year

Read more

Tags: 5G , AAA , Access Manager

UK Regulator Ofcom & Net Neutrality

Read more

Tags: 5G

RCR Wireless

Road to 5G: Navigating the complexities of 5G hyperscaling

Read more

Tags: 5G , 5G Core , Cloud Native

Parents Want Network Safeguards For Their Kids Online

Read more

Tags: 5G , Deep Packet Inspection , DPI Filter

5G Hyperscaling with AT&T, Microsoft, & Enea

Read more

Tags: 5G , Cloud Native , Network Data Layer