Radar, September 2019

Topic

Security

Radar, September 2019
This insight is locked

This insight is open to all subscribers and registered users, or available by completing the form below.

Report details

Radar, September 2019
Pages
40
Released
SEPTEMBER 2019

The Radar continues to throw light on a handful of emerging topics and trends that the telecoms industry is affected by, and this month is no different.  Once again we bring you a selection of perspectives and analyses on key topics to keep you informed of the forces shaping our world. These will hopefully help you make stronger, forward-looking strategic decisions.

In this edition of the Radar we are pleased to build on a previous article exploring the possibility of a ‘hyper reality’ scenario in advertising.  The advertising industry has taken some knocks in recent months: not only is data usage by advertisers coming under increased scrutiny, consumers are also reporting that advertising can be so targeted as to be disturbing. We explore how a move back to targeting anonymous groups, rather than specific individuals, may provide opportunities for more traditional advertising media, such as billboards and television, and how operators could give a leg-up to advertisers looking to bridge the online and offline worlds.

In our second piece we look at data hubs, a potential solution to the growing need for the steady flow of data in the future of the Internet of Things (IoT). While data hubs will be of great use to commercial organisations, we focus on their potential as a tool for public good, where opportunities are rife.

We close out this edition with an infographic delving into the dangers of cyberwarfare, a topic at the heart of many recent news stories. The dawn of the 5G era will complement the growing footprints of AI and IoT, exponentially increasing the threat from highly organised actors looking to cause damage. As the connecting fabric of the digital economy the telecoms industry is likely to be a target of such attacks. We examine how operators, as well as enterprises, can mitigate this threat.

Download the Report

Complete the form below to get instant access to this content. For easier access in the future, you can register for a free account here.

By submitting this form, you agree that your email address and related activity on the platform will be processed for the purpose of generating and providing the requested report. Your data will be shared with GSMA Intelligence for this purpose. For more information, please see the GSMA Intelligence Privacy Policy.

Opt-in for Marketing Communications:
To ensure you stay up-to-date on the latest developments in the mobile industry, GSMA Intelligence would like to send you information about events, products, services, and initiatives, as well as industry news. Please subscribe by ticking this box; once subscribed, you can tailor what you receive from us at any time, or unsubscribe, should you wish.

Authors

How to access this report

Annual subscription: Subscribe to our research modules for comprehensive access to more than 200 reports per year.

Enquire about subscription

Contact our research team

Get in touch with us to find out more about our research topics and analysis.

Contact our research team

Media

To cite our research, please see our citation policy in our Terms of Use, or contact our Media team for more information.

Learn more

Related research

Telco security governance and strategies: Asia Pacific

Topic
Security

Cybersecurity is a shared responsibility, requiring operators to adopt a holistic approach that integrates technology, personnel and processes. To evaluate the cybersecurity governance and strategies of operators, GSMA Intelligence undertook a global survey involving 100 operators worldwide. This report provides an overview of the cybersecurity governance and strategies of operators in Asia Pacific.

This insight is locked

IoT in a post-quantum world: coming sooner than you think

Topics
Security
Internet of things (IoT)

The benefits of quantum computing come from the order-of-magnitude increase in computational power compared to conventional computers. This enables a range of use cases from predictive analytics to pharmaceutical simulations. However, there are also risks, primarily related to security vulnerabilities. Overall, we estimate around 8% of IoT devices currently in active use are quantum safe. Conversely, over 90% (i.e. nearly all) of IoT devices are exposed. The exposure risk for telcos comes at multiple levels, including networks, billing systems, consumer devices and IoT. The focus in this report is on the IoT dimension because it represents the largest universe of devices, is highly disparate and is particularly open to security risks due to the ageing nature of many assets deployed today.

This insight is locked

The telco threat landscape and security strategies in Europe

Topic
Security

Over the past few years, AI has started to transform industries across Europe and around the world. However, alongside the positive impact of AI-driven innovation has been a wave of new, sophisticated and unpredictable cyberthreats.

This insight is locked
Full access
Get full access to our research now, get in touch with us to find out more about our research topics and analysis
  • 200 reports a year
  • 50 million data points
  • Over 350 metrics