DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Security Gaps Pose Risks To Private 5G Networks

DigitalCIO Bureau by DigitalCIO Bureau
March 5, 2025
in Tech News
0
Security Gaps Pose Risks To Private 5G Networks
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Trend Micro  has released new joint research with CTOne warning that a lack of communications technology (CT) expertise could be exposing private 5G networks to compromise, despite the widespread adoption of AI security tools.

Rachel Jin, Chief Enterprise Platform Officer at Trend: “Not all AI security is created equal, and some organizations are putting themselves at risk due to lack of know-how. Proactive attack surface management is crucial for private 5G networks, where any oversight can open the door to compromises. Security leaders must combine AI-powered protection with a deep understanding of technology and cyber risk to safeguard these critical environments.”

Private 5G networks are booming thanks to their use across critical industries including energy and utilities, military, logistics, healthcare, and smart manufacturing. 100% of Trend survey respondents revealed they are either currently using them (86%) or evaluating their deployment (14%).

IT and cybersecurity professionals also appear to understand the potential benefits of AI-powered security in these environments: nearly all said they are either currently using (62%) or planning to use (35%) such tools for private 5G networks.

They view the following AI-powered capabilities as essential in this regard:

  • Predictive threat intelligence (58%)
  • Continuous, adaptive authentication (52%)
  • Zero trust enforcement (47%)
  • Self-healing networks featuring AI automation (41%)

Jim Frey, Principal Analyst, Networking for ESG: “Organizations are finding great operational value from private 5G networking, often as a part of AI projects. But they must ensure that their security operations center is prepared to monitor and protect this emerging communications technology. Cybersecurity providers that can deploy proactive risk management, attack path prediction, and other proactive measures will be well positioned to help protect private 5G and AI architectures.”

More than nine in ten organizations currently using AI security admit to facing challenges in deploying the tech to private 5G networks. High costs (47%), concerns over false positives/negatives (44%), and a lack of internal expertise (37%) were most frequently cited.

A lack of in-house CT know-how is reflected in the fact that just a fifth (20%) of global organizations have a dedicated team for securing their communications networks. In many cases, responsibility for CT security lies with the CTO (43%) or CIO (32%).

Jason Huang, CEO at CTOne: “As enterprise use of private and public mobile networks accelerates, we are seeing new challenges that demand specialized CT security capabilities. Organizations need the ability to secure end-to-end combined broad visibility that fits with SecOps needs, enabling them to manage their enterprise attack surface risk as it expands to support new wireless applications.”

On average, less than a fifth (18%) of organizations’ security budget is currently allocated to private 5G networks, despite the critical services they support and the highly sensitive data flowing through these networks.

Trend’s research revealed that organizations may be unwittingly exposing themselves to cyber and compliance risks by failing to safeguard use of AI for traffic monitoring/analysis.

Specifically, only around half or fewer respondents said that they:

  • Ensure compliance with data privacy regulations like GDPR (54%)
  • Encrypt data at rest and in transit (51%)
  • Deploy strict access controls for AI models (50%)
  • Use data anonymization techniques (44%)

 

 

Tags: Trend Micro
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Digital Fraud Overtakes Ransomware as CEOs’ Biggest Concern

by DigitalCIO Bureau
January 19, 2026
0
Retail Industry — Next Big Target for Hackers?

Artificial intelligence, geopolitical fragmentation and a surge in cyber-enabled fraud are redefining the global cyber risk landscape at unprecedented speed, according to the World Economic Forum’s Global Cybersecurity Outlook...

Read moreDetails

Cyera Secures $400M Series F, Hits $9B Valuation

by DigitalCIO Bureau
January 13, 2026
0
Cyera Secures $400M Series F, Hits $9B Valuation

Cyera has announced a $400 million Series F funding round, bringing its total funding to over $1.7 billion. This raise comes just six months after the previous round...

Read moreDetails

Trend Micro Closes Vulnerabilities in Apex Central

by DigitalCIO Bureau
January 9, 2026
0
Financial organizations receive an average of 2200+ application security vulnerability alerts every month: Dynatrace CISO Regional Bank 2023 report

The National Cyber ​​Security Centre (NCSC) is warning of vulnerabilities in Trend Micro Apex Central. These vulnerabilities could potentially cause a Denial-of-Service (DoS) attack. Updates addressing the vulnerability...

Read moreDetails

Aditya Birla Ventures invests in GenAI Company Articul8 AI

by DigitalCIO Bureau
January 9, 2026
0
AMD Acquires Open-Source AI Software Expert Nod.ai

Aditya Birla Ventures has announced its investment in the first tranche of Articul8 AI, Inc.’s oversubscribed Series B financing round. Articul8 AI, an enterprise generative AI (GenAI) software...

Read moreDetails

Snowflake Acquires Observe

by DigitalCIO Bureau
January 9, 2026
0
CRISIL To Acquire Bridge To India Energy

Snowflake has signed a definitive agreement to acquire Observe, a leader in AI-powered observability. With this acquisition, Snowflake will deliver the next generation of AI-powered observability, built on open standards...

Read moreDetails
Next Post
Huntress Reveals Threats Facing SMBs

Eight In Ten CISOs See Significant Impact From AI-Powered Threats

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Check Point To Acquire External Risk Management Firm Cyberint

August 28, 2024
Microsoft Aims To Double Cloud Computing Business In Germany

Microsoft to Invest $2.1 bn in AI and Cloud Infrastructure in Spain

February 21, 2024
Thales joins forces with Google Cloud

Almarai Selects Google Cloud to Drive Digital Transformation

November 6, 2024

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft New Relic NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?