<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Archives - NGMN</title>
	<atom:link href="https://www.ngmn.org/tag/security/feed" rel="self" type="application/rss+xml" />
	<link>https://www.ngmn.org/tag/security</link>
	<description>WE MAKE BETTER CONNECTIONS</description>
	<lastBuildDate>Tue, 03 Feb 2026 11:12:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.5</generator>
	<item>
		<title>BCN LATAM SUMMIT</title>
		<link>https://www.ngmn.org/archive/bcn-latam-summit.html</link>
		
		<dc:creator><![CDATA[Nadine Fassbender]]></dc:creator>
		<pubDate>Thu, 07 Mar 2024 13:21:22 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[IE_Archive]]></category>
		<category><![CDATA[IE_Archive_2024]]></category>
		<category><![CDATA[6G]]></category>
		<category><![CDATA[6G Trustworthiness Considerations]]></category>
		<category><![CDATA[Networks]]></category>
		<category><![CDATA[NGMN]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.ngmn.org/?p=13917</guid>

					<description><![CDATA[<p>13 March 2024 - Virtual</p>
<p>The post <a href="https://www.ngmn.org/archive/bcn-latam-summit.html">BCN LATAM SUMMIT</a> appeared first on <a href="https://www.ngmn.org">NGMN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>We were excited to be part of the BCN LATAM SUMMIT, the largest virtual telecom event in Latin America, addressing the key topics within the telecommunications industry.</p>
<p>Our Programme Manager Reg Cox shared NGMN´s view and considerations <span data-scheme-color="@404040,1,18:75000,19:25000" data-usefontface="false" data-contrast="none">towards technology design in order to fulfil the </span><span data-scheme-color="@404040,1,18:75000,19:25000" data-usefontface="false" data-contrast="none">trustworthiness needs of consumers and Mobile Network </span><span data-scheme-color="@404040,1,18:75000,19:25000" data-usefontface="false" data-contrast="none">Operators.</span>​</p>
<p>Access our &#8220;6G Trustworthiness Considerations&#8221; publication <a href="https://www.ngmn.org/wp-content/uploads/NGMN_6G_Trustworthiness.pdf">here</a>.</p>
<p>We invite interested industry players to <a href="https://www.ngmn.org/about-us/membership.html">become part of our endeavor. </a></p>
<p>The post <a href="https://www.ngmn.org/archive/bcn-latam-summit.html">BCN LATAM SUMMIT</a> appeared first on <a href="https://www.ngmn.org">NGMN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>6G Trustworthiness Considerations</title>
		<link>https://www.ngmn.org/publications/6g-trustworthiness-considerations.html</link>
		
		<dc:creator><![CDATA[datenfluss]]></dc:creator>
		<pubDate>Wed, 04 Oct 2023 07:31:56 +0000</pubDate>
				<category><![CDATA[2023]]></category>
		<category><![CDATA[Publications]]></category>
		<category><![CDATA[6G]]></category>
		<category><![CDATA[6G Trustworthiness Considerations]]></category>
		<category><![CDATA[Networks]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.ngmn.org/?p=12858</guid>

					<description><![CDATA[<p>This NGMN publication provides a comprehensive guide for establishing trustworthiness within 6G networks. It identifies critical technological trends impacting the trustworthiness of 6G networks, including Network AI, open-source solutions, virtualization and containerization and quantum computing. Through these insights NGMN guides the industry through designs and implementations that bolster security and strengthens privacy protection.</p>
<p>It provides comprehensive guidance across several key requirements and design principles, including network simplification, absolute energy reduction, network AI transformation &#038; predictive network management, safe and resilient infrastructure, global 6G standards, software upgrade to 6G, no intrinsic need for hardware refresh, no compromise to existing services (Voice) and access across mobile, fixed and non-terrestrial networks.</p>
<p>The post <a href="https://www.ngmn.org/publications/6g-trustworthiness-considerations.html">6G Trustworthiness Considerations</a> appeared first on <a href="https://www.ngmn.org">NGMN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div>
<p>This NGMN publication provides a comprehensive guide for establishing trustworthiness within 6G networks. It identifies critical technological trends impacting the trustworthiness of 6G networks, including Network AI, open-source solutions, virtualization and containerization and quantum computing.</p>
<p>By adopting a holistic approach to security and privacy, NGMN not only paves the way for the realisation of future 6G use cases, but also ensures the preservation of end-users&#8217; trust and interests. The publication serves as a vital resource for industry professionals seeking to navigate the complex landscape of 6G network trustworthiness.</p>
<p>With this, NGMN guides the industry through designs and implementations that bolster security and strengthens privacy protection. It offers actionable recommendations and insights to foster secure and privacy-respecting networks.</p>
</div>
<div>
<div  class='avia-button-wrap av-7sejt-8665d4c7424e9ac23c77c97b6c4031a7-wrap avia-button-left  avia-builder-el-0  avia-builder-el-no-sibling '><a href=' /wp-content/uploads/NGMN_6G_Trustworthiness.pdf' class='avia-button av-7sejt-8665d4c7424e9ac23c77c97b6c4031a7 av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-left av-icon-on-hover avia-color-dark' target="_blank" rel="noopener noreferrer" aria-label="Download"><span class='avia_button_icon avia_button_icon_left' aria-hidden='true' data-av_icon='' data-av_iconfont='entypo-fontello'></span><span class='avia_iconbox_title' >Download</span></a></div>
</div>
<p>&nbsp;</p>
<p>The post <a href="https://www.ngmn.org/publications/6g-trustworthiness-considerations.html">6G Trustworthiness Considerations</a> appeared first on <a href="https://www.ngmn.org">NGMN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5G Mobile Network Sharing Security V1.02</title>
		<link>https://www.ngmn.org/publications/5g-mobile-network-sharing-security-v1-02.html</link>
		
		<dc:creator><![CDATA[datenfluss]]></dc:creator>
		<pubDate>Wed, 26 Oct 2022 14:01:09 +0000</pubDate>
				<category><![CDATA[2022]]></category>
		<category><![CDATA[Publications]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[Network Sharing]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.ngmn.org/?p=11466</guid>

					<description><![CDATA[<p>Mobile network sharing could occur on different levels and with various sharing options in the mobile network infrastructure. Usually, these various sharing options require a thorough consideration of levels of protection. However, these levels of protection and security measures might affect the decision of selecting the types of sharing options.</p>
<p>The post <a href="https://www.ngmn.org/publications/5g-mobile-network-sharing-security-v1-02.html">5G Mobile Network Sharing Security V1.02</a> appeared first on <a href="https://www.ngmn.org">NGMN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div>
<p class="p1">Mobile network sharing could occur on different levels and with various sharing options in the mobile network infrastructure. Usually, these various sharing options require a thorough consideration of levels of protection. However, these levels of protection and security measures might affect the decision of selecting the types of sharing options. Vertical industries are facing a great challenge on selecting the suitable sharing option for their service and the adequate security for the particular mobile network infrastructure sharing option. This White Paper provides a reference for MNOs and vertical industries to identify the adequate security on each mobile network infrastructure sharing option.</p>
</div>
<div  class='avia-button-wrap av-7sejt-b73ceda56d9764d4cc6461df62d0f519-wrap avia-button-left  avia-builder-el-0  avia-builder-el-no-sibling '><a href=' /wp-content/uploads/221026-NGMN-5G-Mobile-Network-Sharing-Security-v1.02-2.pdf' class='avia-button av-7sejt-b73ceda56d9764d4cc6461df62d0f519 av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-left av-icon-on-hover avia-color-dark' target="_blank" rel="noopener noreferrer" aria-label="Download"><span class='avia_button_icon avia_button_icon_left' aria-hidden='true' data-av_icon='' data-av_iconfont='entypo-fontello'></span><span class='avia_iconbox_title' >Download</span></a></div>
<p>The post <a href="https://www.ngmn.org/publications/5g-mobile-network-sharing-security-v1-02.html">5G Mobile Network Sharing Security V1.02</a> appeared first on <a href="https://www.ngmn.org">NGMN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NGMN 5G Network Security Capability Framework for Verticals</title>
		<link>https://www.ngmn.org/publications/ngmn-5g-network-security-capability-framework-for-verticals.html</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 15 Jul 2022 15:14:39 +0000</pubDate>
				<category><![CDATA[2022]]></category>
		<category><![CDATA[Publications]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Verticals]]></category>
		<guid isPermaLink="false">https://www.ngmn.org/?p=10283</guid>

					<description><![CDATA[<p>MNOs leverage their 5G networks and services to provide vertical industries with dedicated solutions, including security services to make vertical applications secure and robust. [...]</p>
<p>The post <a href="https://www.ngmn.org/publications/ngmn-5g-network-security-capability-framework-for-verticals.html">NGMN 5G Network Security Capability Framework for Verticals</a> appeared first on <a href="https://www.ngmn.org">NGMN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>MNOs leverage their 5G networks and services to provide vertical industries with dedicated solutions, including security services to make vertical applications secure and robust.</p>
<p>However, various vertical industries have different requirements related to security.</p>
<p>They may request customised network security protection from MNOs.</p>
<p>In this paper, the security requirements for 5G verticals in smart grid, UAS, healthcare, automotive and smart city are analysed and a framework of security capabilities is proposed.</p>
<p>A recommendation is provided to guide vertical industries on how to build and deploy appropriate security capabilities to improve the security level.</p>
<div  class='avia-button-wrap av-7sejt-c17a023c85b50b4e5190654690801c7c-wrap avia-button-left  avia-builder-el-0  avia-builder-el-no-sibling '><a href=' /wp-content/uploads/220715-NGMN-5G-Network-Security-Capability-Framework-for-Verticals-v1.0.pdf' class='avia-button av-7sejt-c17a023c85b50b4e5190654690801c7c av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-left av-icon-on-hover avia-color-dark' target="_blank" rel="noopener noreferrer" aria-label="Download"><span class='avia_button_icon avia_button_icon_left' aria-hidden='true' data-av_icon='' data-av_iconfont='entypo-fontello'></span><span class='avia_iconbox_title' >Download</span></a></div>
<p>&nbsp;</p>
<p>The post <a href="https://www.ngmn.org/publications/ngmn-5g-network-security-capability-framework-for-verticals.html">NGMN 5G Network Security Capability Framework for Verticals</a> appeared first on <a href="https://www.ngmn.org">NGMN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security Considerations for 5G Network Operation</title>
		<link>https://www.ngmn.org/publications/security-considerations-for-5g-network-operation.html</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 04 Aug 2021 15:34:12 +0000</pubDate>
				<category><![CDATA[2021]]></category>
		<category><![CDATA[Publications]]></category>
		<category><![CDATA[Network Operation]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Verticals]]></category>
		<guid isPermaLink="false">https://www.ngmn.org/?p=8424</guid>

					<description><![CDATA[<p>A 5G network relies on many new features like SDN/NFV while also introducing other new features such as slicing and MEC. New technologies and features create new challenges for operators in the 5G era to provide security protection for network operation. Moreover, the 5G network supports vertical industries where additional security requirements need to be [&#8230;]</p>
<p>The post <a href="https://www.ngmn.org/publications/security-considerations-for-5g-network-operation.html">Security Considerations for 5G Network Operation</a> appeared first on <a href="https://www.ngmn.org">NGMN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A 5G network relies on many new features like SDN/NFV while also introducing other new features such as slicing and MEC. New technologies and features create new challenges for operators in the 5G era to provide security protection for network operation. Moreover, the 5G network supports vertical industries where additional security requirements need to be considered by the 5G network to support vertical business services. Although network operation depends heavily on individual operator’s specific deployment and operations systems, it is still a good practice to build a common security ground for the success of 5G network deployment and operation.</p>
<p>The scope of this document is to:</p>
<ul>
<li>Analyse new challenges as well as common security issues for 5G network operation</li>
<li>Investigate security requirements and guidelines in a technical and/or non-technical way for 5G network operation</li>
</ul>
<div  class='avia-button-wrap av-7sejt-a9b9ce63f672170f1647c99c0db2254f-wrap avia-button-left  avia-builder-el-0  avia-builder-el-no-sibling '><a href=' /wp-content/uploads/210804-NGMN-Security-Considerations-for-5G-Network-Operation-V1.0.pdf' class='avia-button av-7sejt-a9b9ce63f672170f1647c99c0db2254f av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-left av-icon-on-hover avia-color-dark' target="_blank" rel="noopener noreferrer" aria-label="Download"><span class='avia_button_icon avia_button_icon_left' aria-hidden='true' data-av_icon='' data-av_iconfont='entypo-fontello'></span><span class='avia_iconbox_title' >Download</span></a></div>
<p>The post <a href="https://www.ngmn.org/publications/security-considerations-for-5g-network-operation.html">Security Considerations for 5G Network Operation</a> appeared first on <a href="https://www.ngmn.org">NGMN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security Competence Team: Sustainable Trust</title>
		<link>https://www.ngmn.org/publications/trust-in-telecommunication-systems.html</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 23 Jul 2021 15:28:55 +0000</pubDate>
				<category><![CDATA[2021]]></category>
		<category><![CDATA[Publications]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Sustainability]]></category>
		<category><![CDATA[Trust Model]]></category>
		<guid isPermaLink="false">https://www.ngmn.org/?p=8382</guid>

					<description><![CDATA[<p>NGMN White Paper on trust in telecommunication systems</p>
<p>The post <a href="https://www.ngmn.org/publications/trust-in-telecommunication-systems.html">Security Competence Team: Sustainable Trust</a> appeared first on <a href="https://www.ngmn.org">NGMN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Trust is a unique property in a human society, and has been implicitly existed in telecommunication system. Properly, managing Trust in telecommunication system would become a norm. Sustainable Trust Model puts telecommunication system into a new era. It provides a runtime evaluation of trustworthiness to all network functions and stakeholders via standard interactions. It also gives a complementary to all standardization development organizations (SDO) Trust Models.</p>
<div  class='avia-button-wrap av-7sejt-880a38dc7cec1f036ed923871cd3f8dc-wrap avia-button-left  avia-builder-el-0  avia-builder-el-no-sibling '><a href=' /wp-content/uploads/210726-NGMN-Sustainable-Trust-V1.0.pdf' class='avia-button av-7sejt-880a38dc7cec1f036ed923871cd3f8dc av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-left av-icon-on-hover avia-color-dark' target="_blank" rel="noopener noreferrer" aria-label="Download"><span class='avia_button_icon avia_button_icon_left' aria-hidden='true' data-av_icon='' data-av_iconfont='entypo-fontello'></span><span class='avia_iconbox_title' >Download</span></a></div>
<p>The post <a href="https://www.ngmn.org/publications/trust-in-telecommunication-systems.html">Security Competence Team: Sustainable Trust</a> appeared first on <a href="https://www.ngmn.org">NGMN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
