🎥 What is O-RAN, really?
O-RAN isn't just a buzzword — it's a structural shift in how we build radio access networks.
By moving away from proprietary, locked-in systems and toward open, cloud-native architectures, operators gain flexibility… but also inherit new risks.
At the beginning of this analysis, we lay the groundwork — defining what O-RAN is before unpacking the security implications throughout the session.
▶️ Watch the full webinar for the complete breakdown: https://app.getcontrast.io/register/p1-security-open-ran
#ORAN #TelecomSecurity #5GSecurity #MobileNetworks #NetworkSecurity #CRAN #OpenRAN #TelcoSec #TelecomTransformation #CyberSecurity #P1Security
Last week, P1 Security was at MWC Barcelona, connecting with industry leaders to discuss the latest in mobile network security. From #5G vulnerabilities to #AI driven cyber threats, the conversations emphasized the need for advanced attack surface management, intrusion detection, and threat intelligence solutions.
🙏 A special thank you to Business France for their incredible support and organization throughout the event.
A huge thank you to our #partners, #customers, and industry #peers who joined us to exchange insights and drive innovation in telecom security. Looking forward to what’s next!
#MWC25 #TelecomSecurity #5GSecurity #CyberThreats #AIinTelecom #P1Security
💥Thank You for Attending Yesterday’s Power-Packed Webinar on 5G Security & Regulatory Frameworks💥
A big shoutout to everyone who joined us for our session: Aligning regulatory frameworks (like NIS2) & TelcoSec guidelines for real-world 5G security led by our CEO & Founder Philippe Langlois, and André Årnes, Partner at White Label Consultancy and former CISO of Telenor Group.
Philippe and André shared real-world insights on the challenges of securing 5G networks and making those regulatory frameworks work in practice. This was more than just theory—it was a practical guide to navigating the complexities of 5G security.
💡 Our Q&A was filled with great questions, covering topics like:
- How do we move from NIS2 & ENISA guidelines to real 5G security controls and audit points?
- How can European telecom operators ensure NIS2 compliance, especially with SS7 access points in high-risk regions?
- What are the key steps to conducting an effective maturity assessment?
Missed it live? No problem! You can catch the full recording here: https://app.getcontrast.io/videos/a557b7d8-afea-414f-94d5-52a86193cb35 🎥
Stay tuned for more insights and events on staying ahead in 5G security and compliance.
#5GSecurity #NIS2 #TelecomCompliance #TelcoSec #MobileNetworkSecurity
DeepSec 2024 Training: Attacking and Defending Private 5G Cores – Altaf Shaik
Security is paramount in private 5G networks because of their tailored nature for enterprises. They handle sensitive data, connect mission-critical devices, and are integral to operations. This advanced 5G Core Security Training is a
https://blog.deepsec.net/deepsec-2024-training-attacking-and-defending-private-5g-cores-altaf-shaik/
#Conference #Training #5GSecurity #DeepSec2024 #MobileNetwork #Training
– The arrival of 5G heralds a new era in wireless technology, promising faster speeds, lower latency, and a more interconnected world. However, with these advances come new challenges, especially in the realm of security. Both consumers and cybersecurity teams must be aware of the potential threats and vulnerabilities associated with 5G. Let's delve into what 5G is not just about speed; it's about creating an infrastructure that supports a vast ecosystem of interconnected devices, but it comes with risks. Read more.
Seattle and Bellevue area friends- join us tomorrow (Oct 10) at the T-Mobile Tech Experience #Cybersecurity Speaker Series Event.
Register (free) 👉 rsvp.theworldsbest.events/_rvj03
A. Michalas et al., "From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem"¹
Despite the numerous pompous statements regarding 5G, it is indisputable that 5G creates a radical shift in telecommunications. The main reason is that 5G is an enabler of numerous applications we have long envisioned and either simulated or implemented in test environments, partially or on a smaller scale. 5G will soon unlock the potential of smart cities, industry 4.0, and IoT, to name a few. However, a crucial question is how much we can trust this technology. Since this technology will soon become the core infrastructure for all of the above, it is critical to understand the fundamental security mechanisms that comprise this technology and the guarantees they provide to assess the potential risks we are exposed to. This work follows a non-technical yet bottom-up approach to introduce the reader to the core security mechanisms and establish a baseline for the security of 5G, to demystify the principal notions and processes. Based on the above, we streamline future directions and highlight possible threats.
Despite the numerous pompous statements regarding 5G, it is indisputable that 5G creates a radical shift in telecommunications. The main reason is that 5G is an enabler of numerous applications we have long envisioned and either simulated or implemented in test environments, partially or on a smaller scale. 5G will soon unlock the potential of smart cities, industry 4.0, and IoT, to name a few. However, a crucial question is how much we can trust this technology. Since this technology will soon become the core infrastructure for all of the above, it is critical to understand the fundamental security mechanisms that comprise this technology and the guarantees they provide to assess the potential risks we are exposed to. This work follows a non-technical yet bottom-up approach to introduce the reader to the core security mechanisms and establish a baseline for the security of 5G, to demystify the principal notions and processes. Based on the above, we streamline future directions and highlight possible threats.