0

When we talk about the cybersecurity challenges of 5G, it’s not just about the networks themselves—it’s about the explosion of connected devices that come with them. With the increased criticality of service continuity and the reliance on it, to network slicing, API connectivity, multiple remote teams accessing the network, and the evolution from communications service providers (CSPs) to digital service providers (DSPs), the digital landscape is becoming more crowded and more vulnerable. Every new connection is a potential entry point for cybercriminals, significantly expanding the threat surface.

RELATED: Nokia and industry partners accelerate AI-RAN development #MWC25

This is why Zero Trust Architecture has become essential. It’s no longer just a recommended framework—it’s a foundational strategy. In today’s environment, continuously verifying users and devices, restricting access to only what’s necessary, and the use of digital certificates for secure communications and continuous monitoring is crucial. For Chief Information Security Officers (CISOs), adopting Zero Trust is about building an inherently secure, adaptive posture that keeps pace with the speed and complexity of modern networks.

As 5G redefines what’s possible—bringing massive bandwidth, real-time responsiveness, and unprecedented device density—it also redefines what’s required of cybersecurity. And this makes Zero Trust a leadership imperative for communication service providers.

Embedding security from the ground up

At Nokia’s CNS division, we’ve embraced a security-by-design philosophy. That means we don’t treat security as a bolt-on solution added at the end—we embed it into the very fabric of our network architecture from the start.

ADVERTISEMENT

This approach spans every domain of the network, from the radio access network to the core, cloud, and edge. It includes everything from container security to encryption and micro-segmentation. Our NetGuard Cybersecurity Dome is one example of how we bring this to life—providing full visibility into the network and using automation and AI to proactively detect and respond to threats before they become issues.

We also work with leading global bodies such as O-RAN, ETSI, and GSMA to help shape the cybersecurity frameworks that will define the industry’s future. Our goal is to ensure that next-generation networks aren’t just powerful—they’re also resilient, scalable, and ready for what’s next.

AI at the core of modern cyber defence

The complexity of 5G and cloud-native environments demands a smarter, faster approach to cybersecurity. That’s why we place artificial intelligence – specifically telco-trained GenAI – at the core of our strategy. This enables customers to stay ahead of threats by detecting anomalies, identifying risks and initiating responses in real time.

Our NetGuard Cybersecurity Dome combines extended detection and response (XDR) with GenAI and machine learning to deliver continuous, intelligent monitoring. Customers can detect unusual network behaviour and act immediately – whether by isolating threats, shutting down malicious activity, or automatically reconfiguring the network to prevent escalation.

GenAI also enhances threat hunting, helping security teams focus on what matters most. Rather than getting lost in a flood of alerts, teams receive prioritised, actionable insights drawn from network activity and threat intelligence, aligned with frameworks like MITRE. This AI-driven approach reduces manual workloads and cuts response times from days to minutes.

ADVERTISEMENT

With closed-loop automation, our networks can now detect, decide and act on threats autonomously, moving from reactive defence to proactive, self-healing protection.

Transition from a reactive command centre to a proactive intelligence hub

In environments like private wireless networks and 5G core—where latency is low and reliability is paramount—predictive security is a game-changer. Here, AI plays a critical role in not just spotting threats, but in anticipating them.

By continuously analysing behaviour across the network, AI can recognise patterns, flag anomalies, and determine the likelihood of an incident before it occurs. This allows the system to take pre-emptive action, such as isolating traffic, adjusting access controls, or tightening policies as needed.

In dynamic, mission-critical settings, this kind of proactive defence makes all the difference. It ensures security remains strong without slowing down performance or interrupting operations—exactly what’s needed in sectors like public safety, transport or utilities where downtime simply isn’t an option.

Security without compromise

A key challenge with next-generation networks is finding the right balance between robust security and high performance. Traditional approaches often force a trade-off: tighten security and risk latency or prioritise speed and leave gaps in protection.

We’ve solved this by building security directly into the network infrastructure. Because security isn’t an add-on, there are no additional chokepoints to slow things down. AI and automation further reduce latency by handling detection and enforcement in real time.

We also use techniques like secure network slicing to isolate different services and user groups within the 5G core. This lets performance and security operate independently and efficiently at scale. By decentralising security—especially at the edge—we reduce backhaul delays while maintaining strict controls and fast response times.

The result is a cybersecurity approach that supports real-time applications while still delivering best-in-class protection.

Intelligent security for intelligent networks

Looking ahead, the role of AI and automation will only grow. As networks become more autonomous, security will need to evolve with them. That means moving from reactive models to predictive ones—where threats are identified and neutralised before they can do harm.

We’re heading toward intent-based security, where systems understand the context of what’s happening and adjust defences automatically. This will be essential in managing the scale and complexity of future environments, from the edge to the core, and eventually into 6G.

In a world where networks are smart, adaptive, and autonomous, only security that shares those same qualities will be able to keep up. That is why we’re building that future today—transforming cybersecurity into an intelligent, integrated, and proactive force.

More in Business

You may also like