DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Security Gaps Pose Risks To Private 5G Networks

DigitalCIO Bureau by DigitalCIO Bureau
March 5, 2025
in Tech News
0
Security Gaps Pose Risks To Private 5G Networks
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Trend Micro  has released new joint research with CTOne warning that a lack of communications technology (CT) expertise could be exposing private 5G networks to compromise, despite the widespread adoption of AI security tools.

Rachel Jin, Chief Enterprise Platform Officer at Trend: “Not all AI security is created equal, and some organizations are putting themselves at risk due to lack of know-how. Proactive attack surface management is crucial for private 5G networks, where any oversight can open the door to compromises. Security leaders must combine AI-powered protection with a deep understanding of technology and cyber risk to safeguard these critical environments.”

Private 5G networks are booming thanks to their use across critical industries including energy and utilities, military, logistics, healthcare, and smart manufacturing. 100% of Trend survey respondents revealed they are either currently using them (86%) or evaluating their deployment (14%).

IT and cybersecurity professionals also appear to understand the potential benefits of AI-powered security in these environments: nearly all said they are either currently using (62%) or planning to use (35%) such tools for private 5G networks.

They view the following AI-powered capabilities as essential in this regard:

  • Predictive threat intelligence (58%)
  • Continuous, adaptive authentication (52%)
  • Zero trust enforcement (47%)
  • Self-healing networks featuring AI automation (41%)

Jim Frey, Principal Analyst, Networking for ESG: “Organizations are finding great operational value from private 5G networking, often as a part of AI projects. But they must ensure that their security operations center is prepared to monitor and protect this emerging communications technology. Cybersecurity providers that can deploy proactive risk management, attack path prediction, and other proactive measures will be well positioned to help protect private 5G and AI architectures.”

More than nine in ten organizations currently using AI security admit to facing challenges in deploying the tech to private 5G networks. High costs (47%), concerns over false positives/negatives (44%), and a lack of internal expertise (37%) were most frequently cited.

A lack of in-house CT know-how is reflected in the fact that just a fifth (20%) of global organizations have a dedicated team for securing their communications networks. In many cases, responsibility for CT security lies with the CTO (43%) or CIO (32%).

Jason Huang, CEO at CTOne: “As enterprise use of private and public mobile networks accelerates, we are seeing new challenges that demand specialized CT security capabilities. Organizations need the ability to secure end-to-end combined broad visibility that fits with SecOps needs, enabling them to manage their enterprise attack surface risk as it expands to support new wireless applications.”

On average, less than a fifth (18%) of organizations’ security budget is currently allocated to private 5G networks, despite the critical services they support and the highly sensitive data flowing through these networks.

Trend’s research revealed that organizations may be unwittingly exposing themselves to cyber and compliance risks by failing to safeguard use of AI for traffic monitoring/analysis.

Specifically, only around half or fewer respondents said that they:

  • Ensure compliance with data privacy regulations like GDPR (54%)
  • Encrypt data at rest and in transit (51%)
  • Deploy strict access controls for AI models (50%)
  • Use data anonymization techniques (44%)

 

 

Tags: Trend Micro
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Gartner: AI-optimized cloud infrastructure growing rapidly

by DigitalCIO Bureau
October 15, 2025
0
Infosys: Over $300 billion In Corporate Cloud Commitments Remain Untapped

AI-optimized infrastructure as a service (IaaS) is emerging as the next disruptive growth engine for AI infrastructure. As a result, end-user spending is projected to grow 146% by...

Read moreDetails

OpenAI and Broadcom to Build 10 Gigawatts of AI Infrastructure

by DigitalCIO Bureau
October 15, 2025
0

OpenAI and Broadcom have announced a collaboration for 10 gigawatts of custom AI accelerators. OpenAI will design the accelerators and systems, which will be developed and deployed in...

Read moreDetails

AI Skillsets Critical to Cybersecurity Skills Gap Solution

by DigitalCIO Bureau
October 14, 2025
0
Fortinet Expands Universal SASE Coverage with Two New India-Based Data Centres   

Fortinet has released its 2025 Global Cybersecurity Skills Gap Report, shedding light on the new and persistent challenges organizations face due to the cybersecurity skills gap. The global...

Read moreDetails

Visakhapatnam’s First 50 MW AI Edge Data Center Foundation Laid

by DigitalCIO Bureau
October 14, 2025
0
Visakhapatnam’s First 50 MW AI Edge Data Center Foundation Laid

In a major boost to the Andhra Pradesh government’s digital initiatives, Hon’ble Minister for IT, Electronics and Communications, Real Time Governance and Human Resources Development, Government of Andhra...

Read moreDetails

Mass scanning of Palo Alto Networks, Cisco and Fortinet Login portals

by DigitalCIO Bureau
October 13, 2025
0
Mass scanning of Palo Alto Networks, Cisco and Fortinet Login portals

Cybersecurity intelligence firm GreyNoise has observed an alarming increase in scanning activity against network equipment from major vendors in recent days. Scanning of Palo Alto Networks login portals...

Read moreDetails
Next Post
Huntress Reveals Threats Facing SMBs

Eight In Ten CISOs See Significant Impact From AI-Powered Threats

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Highest Percentage of Cybercrime Activity Originates in Russia

Highest Percentage of Cybercrime Activity Originates in Russia

October 18, 2023
HCLTech and Cisco Enhance Collaborative Environment for Modern Hybrid Workplaces

HCLTech and Cisco Enhance Collaborative Environment for Modern Hybrid Workplaces

November 8, 2023

John T Chambers and Bipul Sinha inaugurates Rubrik’s Bengaluru R&D Centre to Solve Cloud Data

October 23, 2019

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?