IoT provides a foundation for ensuring security in 5G propositions
Access this insight with a Premium plan. Contact our sales team to get started.
Report details
IoT provides a foundation for ensuring security in 5G propositions
The GSMA held its Mobile 360 event in The Hague last month to share approaches to security challenges in 5G. The sector bears the burden of investing in, deploying and operating networks but has to fill the gap that 5G exposes in technical skills, business processes and cultural mindset. In among the 5G topics at the event was IoT security, with speakers sharing how they safeguard networks as IoT is deployed. We argue that operators can draw lessons from ensuring security in their IoT portfolios as a foundation for their 5G propositions for enterprises.
Report details
IoT provides a foundation for ensuring security in 5G propositions
Related research
IoT in a post-quantum world: coming sooner than you think
The benefits of quantum computing come from the order-of-magnitude increase in computational power compared to conventional computers. This enables a range of use cases from predictive analytics to pharmaceutical simulations. However, there are also risks, primarily related to security vulnerabilities. Overall, we estimate around 8% of IoT devices currently in active use are quantum safe. Conversely, over 90% (i.e. nearly all) of IoT devices are exposed. The exposure risk for telcos comes at multiple levels, including networks, billing systems, consumer devices and IoT. The focus in this report is on the IoT dimension because it represents the largest universe of devices, is highly disparate and is particularly open to security risks due to the ageing nature of many assets deployed today.
The telco threat landscape and security strategies in Europe
Over the past few years, AI has started to transform industries across Europe and around the world. However, alongside the positive impact of AI-driven innovation has been a wave of new, sophisticated and unpredictable cyberthreats.
Telco security in Qatar: an asset-driven response
As 5G becomes the foundation of Qatar's digital economy (powering finance, e-government, smart transport and critical infrastructure), the importance of securing networks extends beyond consumer protection to national security and economic stability.
Authors
How to access this report
Annual subscription: Subscribe to our research modules for comprehensive access to more than 200 reports per year.
Enquire about subscriptionContact our research team
Get in touch with us to find out more about our research topics and analysis.
Contact our research teamMedia
To cite our research, please see our citation policy in our Terms of Use, or contact our Media team for more information.
Learn moreRelated research
IoT in a post-quantum world: coming sooner than you think
The benefits of quantum computing come from the order-of-magnitude increase in computational power compared to conventional computers. This enables a range of use cases from predictive analytics to pharmaceutical simulations. However, there are also risks, primarily related to security vulnerabilities. Overall, we estimate around 8% of IoT devices currently in active use are quantum safe. Conversely, over 90% (i.e. nearly all) of IoT devices are exposed. The exposure risk for telcos comes at multiple levels, including networks, billing systems, consumer devices and IoT. The focus in this report is on the IoT dimension because it represents the largest universe of devices, is highly disparate and is particularly open to security risks due to the ageing nature of many assets deployed today.
The telco threat landscape and security strategies in Europe
Over the past few years, AI has started to transform industries across Europe and around the world. However, alongside the positive impact of AI-driven innovation has been a wave of new, sophisticated and unpredictable cyberthreats.
Telco security in Qatar: an asset-driven response
As 5G becomes the foundation of Qatar's digital economy (powering finance, e-government, smart transport and critical infrastructure), the importance of securing networks extends beyond consumer protection to national security and economic stability.
- 200 reports a year
- 50 million data points
- Over 350 metrics
