About Us

Atos 5Guard improves organizations’ 5G security posture

Atos has introduced its new ‘5Guard’ security offering for organizations looking to deploy private 5G networks as well as telecom operators seeking to enable integrated, automated, and orchestrated security to protect and defend their assets and customers.

With customers looking to improve their 5G security posture, Atos’ offering aims to assist organizations in identifying risks and developing an end-to-end security strategy to protect critical business and data and accelerate their digital transformation.

Zeina Zakhour, VP & CTO of Digital Security at Atos stated, “While 5G can be a game-changer for organizations, we want them to be able to streamline their security deployment and configuration process in their specific 5G environment.

Our 5Guard cutting-edge offering represents our commitment to providing the highest level of security for organizations looking to deploy private 5G networks and for telecom operators.”

Atos’ 5Guard offering includes:

  • Through Atos’ consulting capabilities, assist in defining a 5G security strategy. Atos assists clients in assessing their systems, designs, and architectures, and then provides strategic recommendations based on the security capabilities of the infrastructure, architecture, and components, in accordance with security standards, frameworks, and regulations. Atos’ strategic recommendations address customers’ business requirements based on risk tolerance.
  • 5G data and network security solutions to address identified risks and security gaps, leveraging best-of-breed 5G security vendors and Atos’ proprietary technological building blocks.
  • Atos’ product portfolio includes encryption solutions (Trustway); identity and access management software; public critical infrastructure solutions (IDnomic); and the Atos Managed Detection and Response (MDR) platform, which strengthens 5G network elements, applications, and workloads security by detecting and responding to potential threats in real-time.
  • Fortinet’s 5G security solutions provide comprehensive security for user and control planes, application and platform protection, exposure security, and multi-tenant security.
  • 5G security operations for multi-cloud security, detection, and response, and 5G network security, based on Atos managed security services.

For organizations looking to deploy fully featured and secure 4G LTE and 5G private networks, 5Guard can also be integrated with Atos’ private secure radio network system, Lifelink.

John Maddison, EVP of Products and CMO at Fortinet commented, “We are delighted to collaborate with Atos in delivering their ‘5Guard’ 5G security offering. Fortinet solutions provide cybersecurity capabilities for private and public 5G networks and services and enable greater trust and compliance. By interfacing with Atos’ managed security services, we provide a comprehensive solution that protects 5G networks, 5G-enabled industrial environments, and 5G services, for the benefit of the ecosystem.”

Xcitium ZeroDwell Containment isolates all unknown or suspect code that enters a business 

Xcitium has released ZeroDwell Containment, an endpoint security solution for customers with or without legacy EDR products. Traditional detection methods leave gaps in enterprise cybersecurity defenses, which Xcitium multi-patented technology fills. 

Tim Bandos, EVP of SOC services at Xcitium stated, “However sophisticated your security stack, there will always be new threats that slip through the cracks. With an estimated 560,000 new pieces of malware created every day, legacy EDR vendors will fail to detect anywhere between 1% and 5% of Unknown hostile payloads that cause immense damage.” 

The solution that guarantees zero dwell time for cyberattacks and is able to thwart unknown threats without sacrificing productivity is called ZeroDwell Containment. The dwell time is the amount of time it takes for an attacker to infect a system for the first time and for that infection to be discovered. 

The likelihood of harm, disruption, or theft from malware, phishing, ransomware, and other types of cyber-attack rises as dwell time does. The industry’s average dwell times on average are well known to be 21 days. 

Ken Levine, CEO of Xcitium stated, “No system that relies on detection alone can ensure all malware will be found and eliminated before it causes damage. Traditional detection is unable to detect Unknown objects, and this is why breaches and ransoms persist worldwide! Xcitium, however, contains all Unknown objects that have no known signature or hash, preventing attacker damage. This protection-first approach closes the cyber security gap. Organizations that run Zero Dwell Containment either with our full endpoint or alongside their existing solutions are more secure. To prove the point, Xcitium publishes weekly statistics.” 

Julio Guapo, CIO of Positivo Tecnologia shared, “We selected Xcitium as the cybersecurity solution to protect our internal company environment and users. During the POC process, the Positivo Tecnologia IT Security team put Xcitium through its paces, testing and repeatedly challenging its ZeroDwell Containment technology. Xcitium isolated the attacker’s execution path every single test period, so the threat was prevented from harming any endpoint.” 

Cox collaborates with Intel, and Future Technologies to provide end-to-end private networks for business clients

Cox Communications has announced its collaboration with Intel and Future Technologies to create and implement end-to-end regulated private network solutions for business customers in the public and private sectors. The new go-to-market agreement brings together Cox’s Edge infrastructure, fiber assets, and its potential to end-to-endpr design, manage, and deliver private wireless connectivity for a wide range of commercial industries and sizes with Intel’s portfolio of cloud-to-edge solutions, Future Technologies’ segment expertise, and system integration experience.

Cox Private Networks is a component of the company’s portfolio that functions as a whole to meet the connectivity, telecom, and IT demands of commercial customers. It debuted in 2022 and makes use of both LTE/5G and fixed wireless access. Cox Communications deploys service to millions of homes and companies across 18 states as the largest private broadband provider in America. More than 370,000 business owners nationwide, including healthcare providers, K–12 and college education, financial institutions, and governmental organizations, rely on the managed and cloud solutions offered by Cox Business, a division of Cox Communications that specializes in commercial services. These services create connected environments and support applications.

Jeff Breaux, executive vice president of Cox Business, the company’s comprehensive commercial services division explained, “The combined knowledge and expertise created by this new relationship will help us solve the biggest operational challenges with end-to-end network solutions, accelerate the journey of digital transformation and provide a better experience for employees, customers and visitors.”

Several smart city technologies have been implemented in the initial Cox Private Network deployments. A regulated private network that uses a millimeter wave spectrum to convey high-quality data for insights on park utilization, vehicle volumes, and health facility, was constructed by Cox as part of an early smart park trial with the city of Las Vegas.

In the Fremont District of Downtown Las Vegas, the company is currently putting in place an extra private network that spans eight city blocks and will provide customers and companies with real-time data on safety, parking, air quality, noise levels, and pedestrian counting. To increase digital equity in the district, Cox has also built a private wireless network extension using Citizens Broadband Radio Service (CBRS) to link low-income public schools kids at home. Further business use cases in sectors including healthcare, government, manufacturing/distribution, higher education, and campus- and venue-based environments are supported by tailored private network solutions.

 “Private LTE/5G is one of the fastest growing and most promising technologies, and customers are asking for assistance to pull together solutions for their unique business needs. This collaboration with Cox and Future Technologies brings together our collective domain expertise, system integration, product portfolio and customer support to help our customers implement private network solutions and meet the growing demands of enterprises,” said Caroline Chan, vice president and general manager, Intel Network Business Incubator Division. 

CyberSaint Executive Dashboard to empower CISO for cyber risk communication 

CyberSaint will enable CISOs to present their cyber risk posture to the C-suite and Directors using CyberSaint’s Executive Dashboard in a credible, financially quantifiable manner that facilitates informed decision-making. 

Jerry Layden, CEO of CyberSaint stated, “At CyberSaint, we understand the importance of transparency and clear communication when it comes to cybersecurity, one of today’s most existential risks. 

With the new SEC regulations requiring boards to report on their cyber risk posture, it is more important than ever for companies to have a real-time, flexible, and intuitive platform with which to assess, measure, and remediate cyber risk. We are confident that this new dashboard will be an invaluable asset to our customers and help them build cyber resilience.” 

The Executive Dashboard is just the newest of many features that CyberSaint makes available through its CyberStrong platform. The platform offers a thorough and automated approach to assisting organizations in assessing, measuring, and resolving their particular cyber risks. 

The Executive Dashboard compares an organization’s cyber risk profile to that of competitors in the same industry and enables security and business leaders to show progress over time. 

The Executive Dashboard gives security leaders the ability to communicate their organization’s cyber risk level as well as the steps being taken to mitigate cyber risks succinctly and clearly. It was co-developed with the top cyber risk consultancies and forward-thinking CISOs. It enables simple progress monitoring and the capability to pinpoint areas that need improvement. 

Padraic O’Reilly, CPO at CyberSaint commented, “The Executive Dashboard is a game-changer for CISOs looking to tell a credible story about the past, present, and future of their cyber risk posture to business leadership. 

We are constantly looking for ways to improve and enhance our platform, and the Executive Dashboard is a testament to our commitment to delivering data-driven solutions to our customers and partners.” 

Protecting Your Privacy in the Era of 5G

The adoption of 5G technology has opened a wide range of new possibilities for advancement and innovation in the areas of connectivity and communication. 5G has the potential to revolutionize how we communicate, work, and handle large amounts of data at faster speeds than ever before. But new cybersecurity risks and privacy worries come along with this new technology.

The fifth generation of wireless technology, or 5G, offers higher capacity, lower latency, and faster internet speeds than 4G. It operates by using radio waves with a higher frequency, which enables the transmission of more data over the air. With more available bandwidth, data can be downloaded and uploaded more quickly, and high-definition video and audio can stream more smoothly. Additionally, 5G’s low latency enables real-time communication between devices, enabling the use of services like virtual reality and autonomous vehicles that need a quick and dependable connection.

5G and Potential Cybersecurity Risks

One of the most serious security concerns with 5G is the possibility of increased cyber-attacks. The surface area for potential attacks is much larger now, as more devices and applications are connected to the network. This makes it easier for hackers to exploit flaws and steal sensitive data. Furthermore, 5G technology is still in its early stages, and many security measures are yet to be fully developed, making it more vulnerable to attacks.

The use of small cell stations, which are required for the rollout of 5G technology, is another issue. Because these small cell stations are both smaller in size and several in number than the conventional cell towers, they can be positioned closer to the end users. While this enables faster and more dependable connectivity, it also makes them more vulnerable to tampering and hacking. Additionally, a large number of these small cell stations are internet-connected, making them susceptible to cyberattacks that could bring down the entire network.

Major privacy concerns in 5G

Privacy is yet another important issue with 5G technology. With 5G, it is now possible to gather, store, and process enormous amounts of data in real-time due to its increased speed and capacity. Sensitive information about people’s locations, online behaviors, and personal particulars may be included in this data.

Another concern of privacy is data protection at endpoints such as mobile devices and IoT devices. Because they are frequently connected to the internet and can be used to access sensitive information, these devices are the most vulnerable. These new connected environments will introduce new vulnerabilities, which, if not properly secured, will have unintended consequences. Because these devices will not necessarily be connected to a central network in the traditional hub-spoke model, attacks on them are unavoidable. Every device in the security chain has the potential to become vulnerable as billions of IoT devices are connected across a mesh edge environment, endangering the entire enterprise and its customers’ businesses.

Effective security measures

Organizations must be aware of these risks and prepare to take the necessary precautions to address them. Furthermore, it is essential that you keep software and devices up to date with the most recent security updates and patches. This will help to reduce the likelihood of vulnerabilities being exploited by hackers. Another way to improve security is to use virtual private networks (VPNs) when connecting to the internet via 5G. VPNs establish a secure, encrypted connection between your device and the internet, preventing sensitive information from being intercepted. To prevent unauthorized access, it is critical to implement strong security measures on these devices, such as biometric authentication and encryption.

It is extremely crucial to have strong security measures in place to protect privacy. This includes data encryption over the network, secure user authentication, and the ability to detect and respond to potential threats in real-time. Furthermore, organizations must be open about what data they collect, how it is used, and with whom it is shared.

Moving Ahead

5G technology is a major step forward in terms of internet connectivity and communication. However, with this new technology comes new risks to security and privacy. It is essential that both individuals and organizations are informed about these risks and take precautions to stay safe. This includes being cautious about what information they share online, using encryption, and being vigilant about potential threats. By being informed and proactive, we can ensure that we enjoy the benefits of 5G technology while protecting our privacy and security.

Ericsson, Thales, and Qualcomm Partnered to Bring 5G to Space

Ericsson, Thales, and Qualcomm Technologies partnered to take 5G out of this world and onto a network of Earth-orbiting satellites. Following detailed research that included multiple studies and simulations, the parties intend to begin smartphone-use-case-focused testing and validation of 5G non-terrestrial networks (5G NTN).

This will provide future 5G smartphones with 5G connectivity anywhere on Earth along with global wideband data service coverage, including areas where only legacy satellite phone systems with limited data connectivity capabilities are available. The advantages of 5G connectivity via low Earth orbit (LEO) satellites are expected to include coverage in extreme geographies or remote areas such as seas, oceans, and other locations where terrestrial coverage is unavailable.

Erik Ekudden, Senior Vice President and Chief Technology Officer, Ericsson, commented, “This testing and validation cooperation between Ericsson, Thales, and Qualcomm Technologies will be a major milestone in the history of communications as the ultimate result could effectively mean that no matter where you are on Earth – in the middle of an ocean or the remotest forest – high-end, secure and cost-effective connectivity will be available through collaborative 5G satellite and terrestrial connectivity.”

This widespread connectivity would improve 5G smartphone subscriber roaming service capabilities while also enabling global connectivity for 5G use cases in transportation, energy, and health. In the event of major network outages or disasters, the space-based network could also be used to provide backup support to terrestrial networks. Because of the expected security capabilities of 5G NTNs, national government communications might be the primary use case, with the goal of improving national security, public safety, and government networks.

John Smee, senior vice president of engineering, Qualcomm Technologies, stated, “For 5G to fulfill the promise of ubiquitous connectivity, it is imperative that it can also deliver network coverage in areas where terrestrial cellular networks do not exist, whether that be over oceans or in remote areas. Our planned research with Ericsson and Thales will kick off an important step in making this vital technology a reality. We are looking forward to what this collaboration can accomplish.”

After the approval by 3GPP, the global telecommunications standards body for testing, and validation. Ericsson, Thales, and Qualcomm Technologies are ready to support non-terrestrial networks for the first time. The testing will aim to validate various technology components required to enable 5G non-terrestrial networks, such as a 5G smartphone, satellite payload, and ground-based 5G network pieces. This research also aims to demonstrate that 5G NTN can be supported in a smartphone form factor, allowing tomorrow’s 5G smartphone to function as a satellite phone. Initial tests will be conducted in a simulated space environment in France, which is home to the majority of Europe’s space-focused industry.

Read more blogs:

8 Benefits of Cloud Security in 2022!!

Enea Completes AdaptiveMobile Security €45 Million Acquisition Deal

Enea announced that it had agreed to buy AdaptiveMobile Security Ltd, a prominent provider of mobile network security solutions. The acquisition has now been finished. On a cash and debt-free basis, the enterprise value of AdaptiveMobile Security is around EUR 45 million. AdaptiveMobile Security is expected to generate revenues of around EUR 17 million in 2021, with an EBIT margin in 2022 that will be near Enea’s operating margin target.

AdaptiveMobile Security develops software and services for mobile core network messaging and signalling security. The firm’s products protect mobile networks, subscribers, and data from all forms of network-based cyberattacks. Unwanted traffic, which can be linked to security issues, service abuse, or revenue loss, is prevented via messaging security. The goal of signalling security is to keep cyberattacks away from taking advantage of signalling transmission. The service combines carrier-grade signalling firewalls, reporting, and advanced monitoring into one package.

More than 80 mobile operators around the world have used AdaptiveMobile Security’s products and services. Mobile operators and communication platform providers are the two main client categories. The solutions are sold as software licenses, managed services, or cloud services, and more than half of its revenue is recurring.

“I am proud to announce an acquisition that significantly strengthens our cybersecurity portfolio. As the global leader in mobile network security, AdaptiveMobile Security expands our market presence and broadens our offering to operators, creating interesting opportunities in areas such as 5G security,” says Jan Häglund, President and CEO of Enea.

“We are thrilled to become part of Enea, a well-respected leader in the telecommunications and security markets. We are aligned on market strategy and can leverage product synergies that will drive market and customer penetration. Our unique offering of security products will enhance Enea’s product offerings, especially in the area of 5G. It is critical to protect mobile networks against an ever-increasing threat landscape to maintain the integrity of national and international communications. Together with Enea, we can now serve a wider range of customers and offer an unrivalled combination of networking and security expertise,” says Brian Collins, CEO of AdaptiveMobile Security.

Brian Collins will lead AdaptiveMobile Security, which will continue to function as a new business unit within Enea under its current name.

AdaptiveMobile Security announced first unified 5G network security solution to secure mobile networks

AdaptiveMobile Security, the global leader in mobile network security, announced a new trio of interlinked 5G security platforms that enable carriers to secure their 5G infrastructure from both internal and external security threats. This is the first unified 5G network security solution, combining a variety of cybersecurity features to secure 5G networks, vertical APIs, slices and subscribers.

5G networks are likely to be the subject of increasingly sophisticated cyberattacks. The security of 5G networks is an order of magnitude more difficult than that of prior mobile technologies. The attack surface has grown in size, telecom and internet technologies are merging, and attacker tools are becoming more freely available. To prevent nation-state adversaries and criminal groups from using other perceived “trusted” networks to perform missions against an operator’s 5G infrastructure, 5G networks must be secured at the interconnects with other networks and systems installed. Internally, networks must be secured against threat actors compromising rogue slices and new application APIs provided by 5G networks. Internally, networks must be secured against threat actors compromising rogue slices and new application APIs exposed by 5G networks must be secured to avoid the creation of new attack vectors.

“As it currently stands, we do not appear to have learned the security lessons from 3G and 4G. Security in 5G networks is not built-in as promised and major vulnerabilities have been exposed even before the technology has been deployed. 5G network core technologies will be fundamentally insecure, and operators face having to protect their networks from both existing and emerging threats. Attackers already have access to the tools and techniques that are known to be effective, exploiting the IT protocols on which 5G architectures are built. Trust is not a security or a business strategy – governments, regulators, mobile operators, and network equipment vendors must all step up and secure the critical infrastructure of 5G networks. Nation-states and cyber-criminal adversaries will take advantage of any security gaps in mobile networks with catastrophic consequences for nations, networks, enterprises and subscribers,” said Brian Collins, CEO, AdaptiveMobile Security.

AdaptiveMobile Security enables governments, regulators, and mobile operators to understand the nature of new threats, pinpoint global threat actors attacking their network, and prevent internal attacks on network slices by identifying and correlating sources of external and internal attacks on 5G networks and subscribers. Mobile operators can analyze, forecast, and protect against attackers’ methods, intentions, infrastructure, and evolution with the 5G network security solution, which proactively maintains defences against known sources of signalling attacks.

“5G is driving the mobile industry into adopting the technology and techniques of the IT world to increase efficiency and improve functionality. However, while laudable, there needs to be a wider mind-set change. When it comes to securing 5G, the telecoms industry needs to fully embrace a holistic and collaborative approach to secure networks across standards bodies, working groups, operators, and vendors. This new unified approach to 5G network security will be critical in protecting operators’ networks, enterprise customer and subscribers from new and emerging cybersecurity threats,” said Dr. Silke Holtmanns, Head of 5G Security Research, AdaptiveMobile Security.