www.darkreading.com
Open in
urlscan Pro
2606:4700::6811:7563
Public Scan
URL:
https://www.darkreading.com/mobile/securitygen-identifies-the-cybersecurity-priorities-for-mobile-operators-in-2023
Submission: On January 20 via api from TR — Scanned from DE
Submission: On January 20 via api from TR — Scanned from DE
Form analysis
0 forms found in the DOMText Content
The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud ICS/OT Remote Workforce Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Physical Security IoT Black Hat news Omdia Research Security Now Events Close Back Events Events * Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event * Black Hat USA - August 5-10 - Learn More Webinars * The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them Jan 24, 2023 * A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype Feb 01, 2023 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Microsoft Partner Perspectives: Zscaler Newsletter Login / Register The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud ICS/OT Remote Workforce Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Physical Security IoT Black Hat news Omdia Research Security Now Events Close Back Events Events * Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event * Black Hat USA - August 5-10 - Learn More Webinars * The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them Jan 24, 2023 * A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype Feb 01, 2023 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Microsoft Partner Perspectives: Zscaler The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud ICS/OT Remote Workforce Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Physical Security IoT Black Hat news Omdia Research Security Now Events Close Back Events Events * Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event * Black Hat USA - August 5-10 - Learn More Webinars * The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them Jan 24, 2023 * A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype Feb 01, 2023 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Microsoft Partner Perspectives: Zscaler -------------------------------------------------------------------------------- Newsletter Login / Register SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. 3. Event Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading March 23 Virtual Event | <GET YOUR PASS> Event The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them | Jan 24 Webinar | <REGISTER NOW> Report Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW> PreviousNext Mobile 5 MIN READ Products & Releases SECURITYGEN IDENTIFIES THE CYBERSECURITY PRIORITIES FOR MOBILE OPERATORS IN 2023 Open architecture, non-standalone roaming, nation-state attacks, ransomware, and the need for more industry collaboration are among the major 5G security challenges that operators must address in the year ahead. January 19, 2023 PDF ROME, Jan. 19, 2023 /PRNewswire/ -- SecurityGen, the award-winning global provider of security solutions and services for the telecoms industry, today announced its cybersecurity priorities for telecom operators in 2023. "As 5G's global footprint increases, the number of cyber threats targeting 5G increases as well," said SecurityGen co-founder and CTO Dmitry Kurbatov. "In 2023, operators must be aware of the range of these threats and take necessary steps to properly defend their networks, protect their customers, and safeguard their operations and revenue." Kurbatov identifies the main factors shaping the risks and threats that operators must prepare for in the year ahead as follows: 1. 5G related challenges * 5G is open for integration - but also open to attack Unlike previous mobile network generations like 3G and LTE, 5G is designed from the ground up to be flexible and open for integration with multiple external systems. However, the same open architecture that enables this flexibility and easy integration can also make 5G vulnerable and exposed to threats and hidden vulnerabilities. The challenge for operators is to maximise 5G's advanced functionality and interoperability while also recognizing this vulnerability and minimizing the threats arising from 5G's extra openness compared to previous network generations. * Beware of roaming traffic from non-standalone 5G As operators deploy more 5G networks and more users purchase 5G smartphones, the volume of roaming traffic between 5G networks increases. But the majority of this extra roaming traffic goes through non-standalone 5G networks which still use unsecure legacy technology for their core networks, including signaling protocols such as GTP and Diameter, which have proven to be hackable in recent years. Without proper security measures in place, 5G is vulnerable to threats originating from non-5G networks carried in non-5G network traffic – but which are able to damage and disrupt 5G services. 2. Cyberattacks from hostile states and organized crime Telecom networks are critical national infrastructure, which makes them high-value targets for cyberattacks, especially during times of conflict and heightened geopolitical tensions. The growing use of mobile - especially 5G - for connecting and remote monitoring of everything from energy grids and automated factories to smart cities and transport systems, amplifies the damage and disruption that an attack on an operator's network could inflict. Mobile's importance also makes it a target for organized crime groups to launch financially motivated attacks of their own aimed at operators or their subscribers. 3. Operators as high-value targets for ransomware The number and frequency of cyber-attacks such as ransomware and phishing show no signs of slowing down. The threat of ransomware is already well known: however in 2023, expect the bad actors behind them to become more advanced and more selective in their attacks - including targeting mobile networks as the means to breach telecom operators and access the valuable customer data they hold. 4. New industry regulations on security but operators must do more themselves National and pan-regional regulators are pushing the telecom industry to comply with new security requirements that address the heightened threat of cyberattack on digital infrastructure and telecom networks as part of it. Mobile network security is still perceived as an after-thought. Rather than adopt a network-wide, security-by-design approach, many operators continue to rely on inefficient one-off security techniques which leave parts of their networks exposed to hackers. 5. Effective cybersecurity also depends on collaboration * Hinders knowledge sharing When companies and experts share their knowledge and experience, everyone benefits. But with international cooperation undermined by current geopolitical rivalries and tensions, divisions might open between operators and other telecom industry players, industry regulators and national governments that make it more difficult to cooperate on collective joint efforts for better cybersecurity. * Cyber-security skill shortages Cyber-security continues to suffer an ongoing shortage of skilled workers, especially in areas that require specific expertise such as telecoms. Combined with the lack of knowledge sharing, the skills shortage makes it harder to encourage and develop new talent. The telecoms industry, led by operators, needs to step up and invest in training initiatives to attract new workers and provide them with the requisite skills needed to grow the cyber-security talent pool. Against this range of threats, Dmitry identifies the following steps for operators to strengthen the security and resilience of their 5G networks: * Make the security of your 5G network as much of a commercial and operational priority as its performance in terms of speed, throughput, and coverage. The current economic conditions should not put operators off investing in proper security measures. Security is more efficient and cost-effective when it is built-in across the entire system, and not just a patch on the surface. * Adopt a defence-in-depth approach based on continual network-wide assessments and monitoring. 5G networks are a step-change in complexity that are more like IT systems than legacy mobile networks. Regular security checks, continuous analysis and other established cybersecurity methods fine-tuned for the telecom environment will provide the level of detail and in-depth scrutiny that's needed to ensure a 5G network is secure against advanced attacks. * Effective 5G security requires more than just installed software solutions and automated monitoring and testing. Extensive and ongoing training is also essential, so that operator security teams can explore and stay up to date with the latest cyberthreats - and also identify new vulnerabilities as they emerge. "Operator security teams must be mindful of the new, unique security challenges specific to 5G while at the same time not losing sight of the threats inherited by legacy technologies within 5G's set up," explained Kurbatov. "Telecom security cannot be solved by a single-point solution, it requires a comprehensive strategic approach along with collaboration between ecosystem players. Operators and their industry partners should cooperate closely with governments and regulators to ensure cybersecurity receives the attention and investment to protect users and ensure that networks remain safe, secure and resilient," he concluded. About SecurityGen Founded in 2022, SecurityGen is a global company focused on telecom security. We deliver a solid security foundation to drive secure telecom digital transformations and ensure safe and robust network operations. Our extensive product and service portfolio provides complete protection against existing and advanced telecom security threats. Visit www.secgen.com . Photo: https://mma.prnewswire.com/media/1986048/SecurityGen_Dmitry_Kurbatov.jpg SOURCE SecurityGen Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe More Insights White Papers * How Machine Learning, AI & Deep Learning Improve Cybersecurity * Ransomware Resilience and Response: The Next-Generation More White Papers Webinars * The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them * A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype More Webinars Reports * 10 Hot Talks From Black Hat USA 2022 * The Promise and Reality of Cloud Security More Reports Editors' Choice Rackspace Sunsets Email Service Downed in Ransomware Attack Kelly Jackson Higgins 2, Editor-in-Chief, Dark Reading Five Guys Data Breach Puts HR Data Under a Heat Lamp Tara Seals, Managing Editor, News, Dark Reading Beyond the Obvious: The Boldest Cybersecurity Predictions for 2023 Tara Seals, Managing Editor, News, Dark Reading API Security Is the New Black Jonathan Care, Contributing Writer, Dark Reading Webinars * The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them * A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype * Every DDoS Resilience and Response Playbook Should Include These Things * Rethinking Authentication: MFA, Passwordless, Certificates, and More More Webinars Reports * 10 Hot Talks From Black Hat USA 2022 * The Promise and Reality of Cloud Security * How Machine Learning, AI & Deep Learning Improve Cybersecurity * The Foundation for Building Scalable Applications to Fuel Customer Satisfaction and Growth * Defending Against Critical Threats More Reports White Papers * How Machine Learning, AI & Deep Learning Improve Cybersecurity * Ransomware Resilience and Response: The Next-Generation * Ransomware Is On The Rise * State of Ransomware Readiness: Facing the Reality Gap * How Hybrid Work Fuels Ransomware Attacks More White Papers Events * Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event * Black Hat USA - August 5-10 - Learn More * Black Hat Asia - May 9-12 - Learn More More Events More Insights White Papers * How Machine Learning, AI & Deep Learning Improve Cybersecurity * Ransomware Resilience and Response: The Next-Generation More White Papers Webinars * The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them * A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype More Webinars Reports * 10 Hot Talks From Black Hat USA 2022 * The Promise and Reality of Cloud Security More Reports DISCOVER MORE FROM INFORMA TECH * Interop * InformationWeek * Network Computing * ITPro Today * Data Center Knowledge * Black Hat * Omdia WORKING WITH US * About Us * Advertise * Reprints FOLLOW DARK READING ON SOCIAL * * * * * * Home * Cookies * Privacy * Terms Copyright © 2023 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. Cookies Button ABOUT COOKIES ON THIS SITE We and our partners use cookies to enhance your website experience, learn how our site is used, offer personalised features, measure the effectiveness of our services, and tailor content and ads to your interests while you navigate on the web or interact with us across devices. You can choose to accept all of these cookies or only essential cookies. To learn more or manage your preferences, click “Settings”. For further information about the data we collect from you, please see our Privacy Policy Accept All Settings COOKIE PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details Back Button BACK Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label * View Cookies * Name cookie name Confirm My Choices