www.darkreading.com Open in urlscan Pro
2606:4700::6811:7563  Public Scan

URL: https://www.darkreading.com/mobile/securitygen-identifies-the-cybersecurity-priorities-for-mobile-operators-in-2023
Submission: On January 20 via api from TR — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

ICS/OT

Remote Workforce

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Physical Security

IoT

Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
   
 * Black Hat USA - August 5-10 - Learn More
   

Webinars
 * The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them
   Jan 24, 2023
 * A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
   Feb 01, 2023

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler

Newsletter
Login
/
Register

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

ICS/OT

Remote Workforce

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Physical Security

IoT

Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
   
 * Black Hat USA - August 5-10 - Learn More
   

Webinars
 * The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them
   Jan 24, 2023
 * A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
   Feb 01, 2023

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

ICS/OT

Remote Workforce

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Physical Security

IoT

Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
   
 * Black Hat USA - August 5-10 - Learn More
   

Webinars
 * The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them
   Jan 24, 2023
 * A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
   Feb 01, 2023

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler

--------------------------------------------------------------------------------

Newsletter
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to
perform a search.




Announcements
 1. 
 2. 
 3. 

Event
Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading
March 23 Virtual Event | <GET YOUR PASS>
Event
The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them | Jan 24
Webinar | <REGISTER NOW>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top
of Mind | <READ IT NOW>
PreviousNext

Mobile

5 MIN READ

Products & Releases



SECURITYGEN IDENTIFIES THE CYBERSECURITY PRIORITIES FOR MOBILE OPERATORS IN 2023

Open architecture, non-standalone roaming, nation-state attacks, ransomware, and
the need for more industry collaboration are among the major 5G security
challenges that operators must address in the year ahead.
January 19, 2023
PDF


ROME, Jan. 19, 2023 /PRNewswire/ -- SecurityGen, the award-winning global
provider of security solutions and services for the telecoms industry, today
announced its cybersecurity priorities for telecom operators in 2023.



"As 5G's global footprint increases, the number of cyber threats targeting 5G
increases as well," said SecurityGen co-founder and CTO Dmitry Kurbatov. "In
2023, operators must be aware of the range of these threats and take necessary
steps to properly defend their networks, protect their customers, and safeguard
their operations and revenue."

Kurbatov identifies the main factors shaping the risks and threats that
operators must prepare for in the year ahead as follows:

      1.  5G related challenges


 * 5G is open for integration - but also open to attack

Unlike previous mobile network generations like 3G and LTE, 5G is designed from
the ground up to be flexible and open for integration with multiple external
systems. However, the same open architecture that enables this flexibility and
easy integration can also make 5G vulnerable and exposed to threats and hidden
vulnerabilities.

The challenge for operators is to maximise 5G's advanced functionality and
interoperability while also recognizing this vulnerability and minimizing the
threats arising from 5G's extra openness compared to previous network
generations.

 * Beware of roaming traffic from non-standalone 5G

As operators deploy more 5G networks and more users purchase 5G smartphones, the
volume of roaming traffic between 5G networks increases. But the majority of
this extra roaming traffic goes through non-standalone 5G networks which still
use unsecure legacy technology for their core networks, including signaling
protocols such as GTP and Diameter, which have proven to be hackable in recent
years.



Without proper security measures in place, 5G is vulnerable to threats
originating from non-5G networks carried in non-5G network traffic – but which
are able to damage and disrupt 5G services.

      2.  Cyberattacks from hostile states and organized crime

Telecom networks are critical national infrastructure, which makes them
high-value targets for cyberattacks, especially during times of conflict and
heightened geopolitical tensions. The growing use of mobile - especially 5G -
for connecting and remote monitoring of everything from energy grids and
automated factories to smart cities and transport systems, amplifies the damage
and disruption that an attack on an operator's network could inflict. Mobile's
importance also makes it a target for organized crime groups to launch
financially motivated attacks of their own aimed at operators or their
subscribers.

      3.  Operators as high-value targets for ransomware



The number and frequency of cyber-attacks such as ransomware and phishing show
no signs of slowing down. The threat of ransomware is already well known:
however in 2023, expect the bad actors behind them to become more advanced
and more selective in their attacks - including targeting mobile networks as the
means to breach telecom operators and access the valuable customer data they
hold.

      4.  New industry regulations on security but operators must do more
themselves 

National and pan-regional regulators are pushing the telecom industry to comply
with new security requirements that address the heightened threat of cyberattack
on digital infrastructure and telecom networks as part of it.

Mobile network security is still perceived as an after-thought. Rather than
adopt a network-wide, security-by-design approach, many operators continue to
rely on inefficient one-off security techniques which leave parts of their
networks exposed to hackers.

      5.  Effective cybersecurity also depends on collaboration

 * Hinders knowledge sharing

When companies and experts share their knowledge and experience, everyone
benefits. But with international cooperation undermined by current geopolitical
rivalries and tensions, divisions might open between operators and other telecom
industry players, industry regulators and national governments that make it more
difficult to cooperate on collective joint efforts for better cybersecurity.

 * Cyber-security skill shortages

Cyber-security continues to suffer an ongoing shortage of skilled workers,
especially in areas that require specific expertise such as telecoms. Combined
with the lack of knowledge sharing, the skills shortage makes it harder to
encourage and develop new talent. The telecoms industry, led by operators, needs
to step up and invest in training initiatives to attract new workers and provide
them with the requisite skills needed to grow the cyber-security talent pool.

Against this range of threats, Dmitry identifies the following steps for
operators to strengthen the security and resilience of their 5G networks:

 * Make the security of your 5G network as much of a commercial and operational
   priority as its performance in terms of speed, throughput, and coverage. The
   current economic conditions should not put operators off investing in proper
   security measures. Security is more efficient and cost-effective when it is
   built-in across the entire system, and not just a patch on the surface.
 * Adopt a defence-in-depth approach based on continual network-wide assessments
   and monitoring. 5G networks are a step-change in complexity that are more
   like IT systems than legacy mobile networks. Regular security checks,
   continuous analysis and other established cybersecurity methods fine-tuned
   for the telecom environment will provide the level of detail and in-depth
   scrutiny that's needed to ensure a 5G network is secure against advanced
   attacks.
 * Effective 5G security requires more than just installed software solutions
   and automated monitoring and testing. Extensive and ongoing training is also
   essential, so that operator security teams can explore and stay up to date
   with the latest cyberthreats - and also identify new vulnerabilities as they
   emerge.

"Operator security teams must be mindful of the new, unique security challenges
specific to 5G while at the same time not losing sight of the threats inherited
by legacy technologies within 5G's set up," explained Kurbatov.

"Telecom security cannot be solved by a single-point solution, it requires a
comprehensive strategic approach along with collaboration between ecosystem
players. Operators and their industry partners should cooperate closely with
governments and regulators to ensure cybersecurity receives the attention and
investment to protect users and ensure that networks remain safe, secure and
resilient," he concluded.

About SecurityGen

Founded in 2022, SecurityGen is a global company focused on telecom security. We
deliver a solid security foundation to drive secure telecom digital
transformations and ensure safe and robust network operations. Our extensive
product and service portfolio provides complete protection against existing and
advanced telecom security threats.

Visit www.secgen.com .

Photo: https://mma.prnewswire.com/media/1986048/SecurityGen_Dmitry_Kurbatov.jpg

SOURCE SecurityGen

Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities,
data breach information, and emerging trends. Delivered daily or weekly right to
your email inbox.
Subscribe

More Insights
White Papers
 * 
   How Machine Learning, AI & Deep Learning Improve Cybersecurity
 * 
   Ransomware Resilience and Response: The Next-Generation

More White Papers
Webinars
 * 
   The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them
 * 
   A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype

More Webinars
Reports
 * 
   10 Hot Talks From Black Hat USA 2022
 * 
   The Promise and Reality of Cloud Security

More Reports

Editors' Choice
Rackspace Sunsets Email Service Downed in Ransomware Attack
Kelly Jackson Higgins 2, Editor-in-Chief, Dark Reading
Five Guys Data Breach Puts HR Data Under a Heat Lamp
Tara Seals, Managing Editor, News, Dark Reading
Beyond the Obvious: The Boldest Cybersecurity Predictions for 2023
Tara Seals, Managing Editor, News, Dark Reading
API Security Is the New Black
Jonathan Care, Contributing Writer, Dark Reading
Webinars
 * The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them
 * A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
 * Every DDoS Resilience and Response Playbook Should Include These Things
 * Rethinking Authentication: MFA, Passwordless, Certificates, and More

More Webinars
Reports
 * 10 Hot Talks From Black Hat USA 2022
 * The Promise and Reality of Cloud Security
 * How Machine Learning, AI & Deep Learning Improve Cybersecurity
 * The Foundation for Building Scalable Applications to Fuel Customer
   Satisfaction and Growth
 * Defending Against Critical Threats

More Reports

White Papers
 * How Machine Learning, AI & Deep Learning Improve Cybersecurity
 * Ransomware Resilience and Response: The Next-Generation
 * Ransomware Is On The Rise
 * State of Ransomware Readiness: Facing the Reality Gap
 * How Hybrid Work Fuels Ransomware Attacks

More White Papers
Events
 * Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
 * Black Hat USA - August 5-10 - Learn More
 * Black Hat Asia - May 9-12 - Learn More

More Events
More Insights
White Papers
 * 
   How Machine Learning, AI & Deep Learning Improve Cybersecurity
 * 
   Ransomware Resilience and Response: The Next-Generation

More White Papers
Webinars
 * 
   The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them
 * 
   A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype

More Webinars
Reports
 * 
   10 Hot Talks From Black Hat USA 2022
 * 
   The Promise and Reality of Cloud Security

More Reports

DISCOVER MORE FROM INFORMA TECH

 * Interop
 * InformationWeek
 * Network Computing
 * ITPro Today

 * Data Center Knowledge
 * Black Hat
 * Omdia

WORKING WITH US

 * About Us
 * Advertise
 * Reprints

FOLLOW DARK READING ON SOCIAL

 * 
 * 
 * 
 * 
 * 


 * Home
 * Cookies
 * Privacy
 * Terms



Copyright © 2023 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.





Cookies Button


ABOUT COOKIES ON THIS SITE

We and our partners use cookies to enhance your website experience, learn how
our site is used, offer personalised features, measure the effectiveness of our
services, and tailor content and ads to your interests while you navigate on the
web or interact with us across devices. You can choose to accept all of these
cookies or only essential cookies. To learn more or manage your preferences,
click “Settings”. For further information about the data we collect from you,
please see our Privacy Policy

Accept All
Settings



COOKIE PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎
Back Button


BACK



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

 * 
   
   View Cookies
   
    * Name
      cookie name

Confirm My Choices