Industrial manufacturing
Industrial Internet of Things | Industrial materials | Equipment Maintenance and Repair | Industrial programming |
home  MfgRobots >> Industrial manufacturing >  >> Industrial Internet of Things >> Internet of Things Technology

Navigating Security Challenges in Next‑Generation 5G and IPv6 Networks

Navigating Security Challenges in Next‑Generation 5G and IPv6 Networks Samuel S Visner of Netcracker Technology

As the global IT ecosystem transforms with 5G and IPv6, operators and their customers will unlock unprecedented opportunities.

Operators can deliver cutting‑edge services—VR/AR, autonomous vehicles, robotics, smart cities, drones—once considered science fiction. Demand for these services will surge as 5G and IPv6 mature, according to Samuel S. Visner, security director, and Scott Sykes, senior director of Netcracker Technology’s Global Security Organization.

While 5G has been on the horizon for years, the industry is finally breaking through, with widespread deployment expected within the next two to three years. Some operators already label themselves as 5G‑enabled, often referring to advanced LTE; whether they are 5G‑ready or fully 5G‑enabled, the imperative remains: security cannot be an afterthought.

IT and security leaders must begin familiarizing themselves with the unique cyber‑security demands of this new era, preparing teams and systems now rather than when 5G reaches ubiquity.

Security Challenges for Telcos

The rapid proliferation of 5G‑enabled devices, coupled with the explosion of IoT endpoints—sensors in healthcare, traffic management, automotive telematics, drones, smart‑home devices, and the like—all underpinned by IPv6—creates a critical security landscape. Billions of new connections will generate vast streams of data for advanced analytics, demanding robust protection at every layer. Key data types requiring safeguarding include:

Navigating Security Challenges in Next‑Generation 5G and IPv6 Networks

Network slicing further complicates the threat landscape by enabling multiple virtual networks with distinct security and service requirements. This capability amplifies the urgency for operators to secure diverse data streams across dynamic slices.

Overcoming these challenges will demand deep expertise and collaborative partnerships. Most operators will need trusted allies with proven experience to ensure data integrity, customer privacy, and regulatory compliance.

Netcracker’s Enhanced Security Plan

Netcracker partners with operators to safeguard subscriber and other sensitive data throughout the network and across public or private clouds. Our security plan addresses data protection, software integrity, and service reliability.

We rely on a shared responsibility model that includes:

By integrating industry‑leading secure services and solutions, we ensure the confidentiality, integrity, and availability of both Netcracker’s and our customers’ data and systems, countering evolving cyber threats.

Security must be woven into every operator’s 5G strategy. Successful deployment hinges on partnering with a vendor that prioritizes security and has a proven track record in the 5G domain.

The authors are Samuel S. Visner, security director, and Scott Sykes, senior director, Global Security Organization, Netcracker Technology.

About the authors

Scott Sykes is the senior director of the Global Security Organization at Netcracker Technology, Boston, and a former Board Member of the Virginia Cyber Security Partnership, Richmond, VA. He previously served as Chief Information Security Officer at Tata Communications International, Herndon, VA, and held leadership roles at Genworth Financial and Capital One Financial Services, both in Richmond, VA.

Samuel Visner is the director of the National Cybersecurity Federally Funded Research and Development Centre (MITRE), sponsored by the National Institute of Science and Technology. He also serves as Netcracker Technology’s security director and is a member of the Cyber Council of the Intelligence and National Security Alliance, the Cyber Committee of the Armed Forces Communications and Electronics Association, the Council on Foreign Relations, the Atlantic Council, and the Intelligence Community Studies Board, sponsored by the National Academy of Science and the Office of the Director of National Intelligence.

Internet of Things Technology

  1. Why Cloud Data Security Is Becoming Programmable
  2. Cybersecurity in the Multi‑Cloud Era: Overcoming Key Challenges
  3. Securing Smart Meter Lifecycles: Six Proven Strategies for Privacy and Resilience
  4. Top 3 Challenges in Preparing IoT Data for Industrial Success
  5. Industrial IoT Security: A Next‑Generation Blueprint – Part 2
  6. Security, not COVID‑19, hinders 5G’s commercial rollout
  7. Navigating IT Challenges in Modern Manufacturing: Strategies for Digital Transformation
  8. Overcome IoT Data ETL Challenges to Boost ROI
  9. Understanding Cloud Computing Security: How Your Data Stays Safe
  10. Understanding Cloud Security: Key Benefits & Best Practices