& cplSiteName &
Comments
You must login to participate in this chat. Please login.

Patrick is going to be joined by service provider and vendor specialists December 5 at the MOBILE NETWORK SECURITY STRATEGIES one-day conference in New York City

http://events.lightreading.com/mnss/

Blogger

Thanks, Patrick! And thanks everyone for joining. Hope to see some of you in NYC for our Mobile Security conference. Going to be a good one!

Blogger

And thanks everyone for joining in and asking some great questions and making excellent points -- this is a MASSIVE topic with a great many strands.

Blogger

I think we all know there are several layers in the network and I would expcet carriers to encrypt each layer to take the liability off of them.  Then, as someone pointed out, an app on the device and then additional encryption in the handset.  Security on LTE has been questioned for years and probably one of the reasons for the hesitacny in delivering services like VoLTE.

Light Sabre

Thanks Patrick! Great insights.

Blogger

ALL; Thanks all, have a good day.

Light Sabre

Taraseals: Carrier responsibility. Starting point here is that the carrier has responsbility to its employees and shareholders. Consistent with that, carriers allow competitors to lead on security at their peril. It follows from that they need to take a role, although fast moving technology (and regulation) make that a permanently moving set of goal posts.

Light Sabre

all too often, rather-- sorry for typos...

Light Sabre

Hello all.  I am wondering if some of the video optimization solutions carriers are placing into their networks have a filter to weed out spam.

Light Sabre

Ray: I think we've been hearing "Google will solvee the problem" all to aften actually....mostly from Google itself!! ;-)

Light Sabre

Great question, Sarah, about personal information protection, privacy and so on. Thorny, difficult waters there but it seems that should be a big issue in 4G as more people do full computing and move around all kinds of information via mobile broadband. What responsibility does the carrier have in all of that? If any? 

Light Sabre

I know.  Scary right?

Light Sabre
pzernick - not often you hear anyone saying that Google will solve the problem...
 

 

Blogger

People will need to run an app on their phone to block this kind of spam as they do email spam.  Google will solve the problem, not operators

Light Sabre

Ray:Hysteria. Not all and not all.

Light Sabre

RAY, VOLTE. Sure like I said Video messaging. The price of messgaing in going through the floor. Capacity and speed of LTE. You could use the equivlanet of Next Gen SIM boxes to generate hundreds/thousands of video spam messages.

Light Sabre

And certainly before we get to the end of the chat today I want to get to Patrick's opening remark - "Too much box-mongering hysteria on the part of some vendors on the one hand. Too much complacency on the part of some operators on the other."

Are the operators still too complacent and are all the vendors engaging in 'box-mongering hysteria'?

Blogger

Ray: VOLTE. Tendency sometime to think of that as "voice" whereas attacks tend to be associated with "data". Except VoLTE is data....

Light Sabre

Ray: yes! I'm coughing right now. Patrick: That sounds awful. I've heard about SPIT or voice spam...are the possibilities there even greater in VoLTE?

Light Sabre

I thought we would have more questions around VoLTE -- will the introduction of VoLTE services on multiple networks, expected in 2014-15, be the opening of the security threat floodgates?

Blogger

I think people chose that too because of the heightened awareness around the NSA and snooping...

Blogger

On our LR poll, we asked what people are most concerned with and the most votes went to criminals stealing sensitive information. That's often a handset-level issue, but is it a real network threat too? 

Blogger

Taraseals: Robocalls. Not just hijacking for own use but using robocalls as another typoe of DDoS attack. U.S govt issued notice to public govt agencioes recently of this attack. Bombard the Dept of Whatevcer with thousands of calls. Phone them up and demand $5000 for them to stop the attack or else it continues. In RCS land (when we get there...) think of video messaging.  Think of SMS spamming - what about video messaging spamming? Impact on congestion way, way greater.

Light Sabre

Tara - a threat to everyone's health, the Robocalls.... that's an interesting point on service hijacking - I have heard of that being an issue for fixed line ISPs.

Blogger

Robocalls! The bane of the political season! Are there other threats though besides "nuisance" type issues? You're talking about hackers essentially hijacking a VoIP service for their own uses?

Light Sabre

mark12 - welcome! good question, Patrick just completed a report on that called 

Mobile Network Outages & Service Degradations: A Heavy Reading Survey Analysis
Blogger

Mark12. NO doubt there are "vulnerabilities" in Diameter. Issue pertaining to early LTE networks was that it wasn't designed to deal and respond in a telco-like way to flooding incidents. That's being addressed now. Diameter Routing Agents (DRAs) helping too. Wouldn't call that a secuirty vulnerability per se. Sure there are some though. And more in future no doubt.

Light Sabre

Ah yes, security is one reason operators site on why it takes soooo long to work with them on APIs. Exposing network access is a non-trivial issue though. Makes sense, but still. :)

Blogger

pzernick - Yeah, I think that might be a request too far for this medium.... big BIG question! But a good one all the same

 

Blogger

These are potential risk areas but I am intersted in any reported exploits against real vulnerabilties in say Diameter as you mentioned...

Light Beer

Send a link to a good white paper Patrick!

Light Sabre

pzernick: List of threats and costs - not post, resrach and present over 4-6 pages maybe !

Light Sabre

SarahReedy: small cells. Yes a gratuitous snipe on my part.

Light Sabre

TaraSeals Web-facing APIs. The operators are used to exposing their APIs to their subscriebr sim cards, which are highlky, highly secure. Internet's a different animal. SIP very open, very vulnerable. Multiple risk vectors including Robocalls

Light Sabre

Patrick, why aren't public access small cells not an issue? Because they don't have scale yet?

Blogger

Can you talk a little about the possible exploits stemming from those vulnerabilities that you mentioned, like oWeb-facing VoLTE APIs and unencrypted backhaul? What are the looming potential threats involved for carriers and their customers?

Light Sabre

Sarah,

Mpayments has more than just a security issue. Other issue is that other forms of payment in this country are very efficient (believe it or not) compared to the rest of the world. That's why paper checks have stubbornly hung on, even when their end was forecast decades ago.

Light Sabre

TaraSeals. Femtocell issues are known. VZW had an isue on their CDMA femto line earlier this year so goal posts are always moving. public access small cells aren't an issue. In theory they are, in practice there aren't gonna be any for a while anyway....

Light Sabre

Can you post a list of threats (i,e, DOS) by prioritized by most likely and prioritzed the same list again by most costly to operators?

Light Sabre
Identify and block malicious traffic. Big market opportunity for vendors. Operators dont have very granular insight at all into their traffic. Lots of malcious traffic going under the radar. solutions out there to identify and block.
Light Sabre

Mark12; Real 4G threats? All the 3G threats plus some new ones: unencrypted backhaul; volumes of diameter signalling, opening APIs the Internet for VOLTE and RCS. You name it

Light Sabre

That's one big reason mHealth has had a hard time taking off...same with mobile payments.

Blogger

Are $G security threats that different from 3G sewcurity threats?

 

Blogger

TaraSeals: a malware-initiated data breach at a healthcare facility. It all depends. If the malware breach occured on a piece of equipment provide as part of an mHealth service by a care provider to a patient then the care provider would almost certainly be liable for resulting damages, not the service provider.

Light Sabre

Good point re: Femto security. That seems a different ball of wax from 4G networks themselves though...

Light Sabre

And to follow on from the DPI question, what can carriers do to identify and block malicious traffic traversing their networks? Typically terrestrial ISPs don't bother and leave that job up to browser seecurity and the like from what I understand.

Light Sabre

So what are the real 4G/LTE threats and not just speculation (e.g., there were real exploits reported with 3G femto cells)... 

Light Beer

What are the uniquely 4G security measures operators are or should be taking?

Blogger

Hi everyone-- I'm excited about this topic! I have a question: most of the reports focus on Android security and the growth in mobile malware on that platform. It seems that the onus is on end users to adopt better mobile security practices, especially when it comes to BYOD. And, corporate IT departments have the other part of the responsibility to protect their organizations with good policies, defenses and enforcement. What role, if any, do carriers play in taking responsibility for, say, a malware-initiated data breach at a healthcare facility? Or do carriers mainly have an opportunity to offer help to IT folks in the way of offering managed security services?

 

Light Sabre

What do you see as the biggest threat facing operators today?

 

Light Sabre

@pdonegan67 do you know of any reputable vendors who are in business with any Tier 1 carrier?

Light Sabre

pzernik: Not necessarily all that deep so sort of.

Light Sabre

To Ray: IPsec from the base station to the backhaul is uniquely relevant to 4G. A lot of techn ologies are common to 3G and 4G.

 

Light Sabre

Good point, pzernik. I wonder how much of the malware affecting phones happens to rooted phones.

Blogger

By filtering do you mean "deep packet inspection?"

 

Light Sabre

Are there any particular network security technologies that are more suitable for 4G service providers to deploy? And where in the network should they put up their defenses?

Blogger

To Phil Britt: There's a limit to how much an operator can do. But by investing in network-side security filtering you can at least prevent most incoming email or sms borne malware from getting to the user's device.

Light Sabre

Carriers should be able to identify users who ROOT their phones as they can then install applications that are not from an "app store" and also can remove security software that the service provider had pre-loaded on the devices.

Light Sabre

To Ray:

To your question Ray, yes on the whole we do see integrated incumbents generally being stronger in security than pure-play mobile operators but there are still quite a few exceptions to that. More often than not, the reason the integrated incumbents are stronger in security is that because of the association with the fixed line parent, their mobile arms have done disproportionately well in the corporate and government subscriber market. That's been the main driver of their leadership rather than because of graceful interchange of security smarts from the fixed to the mobile side of the house which does sometimes happen but more typically doesn't.

Light Sabre

Hi, all. Looking forward to the chat.

Blogger

Another early question: How does a provider protect against users not practicing "safe mobile security?"

Light Sabre

Nicely set up Patrick! Looking forward to it. I mean, where else can you find an appraisal of "box-mongering hysteria"?

Blogger

Looking forward to today's chat with the Light Reading crew. Good idea to do this - sort out the wheat from the chaffe of this subject matter. Too much box-mongering hysteria on the part of some vendors on the one hand. Too much complacency on the part of some operators on the other. Bring the conversation on.

Light Sabre

This is a test message

Light Sabre

I'm thrpowing out an early question for Patrick -- do  carriers with both fixed and mobile operations teams have an advantage in tackling the network security challenges that come with a 4G rollout because they already have experience of dealing with some of the issues in their fixed networks?

Blogger

Hi everyone! We will be holding our next live chat on Thursday, November 14, at 11 a.m. EST/8 a.m. PST with Heavy Reading senior analyst Patrick Donegan. We'll be discussing the many mobile network security challenges that face wireless operators as they roll out 4G. And there are plenty. Join in right here on Thursday, November 14, at 11 a.m. EST/8 a.m. PST.

Blogger


Light Reading’s Upskill U is a FREE, interactive, online educational resource that delivers must-have education on themes that relate to the overall business transformation taking place in the communications industry.
NEXT COURSE
Wednesday, October 5, 1:00PM EDT
Gigabit & Smart Cities
Joe Kochan, COO & Co-Founder, US Ignite
UPCOMING COURSE SCHEDULE
Friday, October 7, 1:00PM EDT
Gigabit & DOCSIS 3.1
Ty Pearman, Director, Access Architecture, Comcast
Wednesday, October 19, 1:00PM EDT
Securing a Virtual World
Rita Marty, Executive Director, Mobility and Cloud Security, Chief Security Office, AT&T
Friday, October 21, 1:00PM EDT
Security: Evolving the Data Center
Rasool Kareem Irfan, Head, Telecom & Infrastructure Security Practice, Tata Communications Transformation Services Ltd (TCTS)
in association with:
From The Founder
Light Reading today starts a new voyage as part of a larger Enterprise.
Flash Poll
Live Streaming Video
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
LRTV Documentaries
From Philly, With Love

9|30|16   |     |   (5) comments


Join Alan Breznick, cable's answer to the Italian Stallion, as he runs through the highlights of SCTE Cable-Tec Expo, lumbers along in Rocky Balboa's footsteps and searches for the perfect Philadelphia cheesesteak.
LRTV Interviews
CenturyLink: SD-WAN Customers Looking for Value Not Cost Savings

9|30|16   |   5:31   |   (0) comments


At NFV & Carrier SDN in Denver, CenturyLink's Eric Nowak told Light Reading that when customers launch SD-WAN, they aren't necessary looking to save money, but instead they are looking for more value from what they're spending. He also shared some unique case studies and lessons learned from launching SD-WAN services.
LRTV Custom TV
Flexible Deployment Approaches for the Gigabit Services Evolution

9|29|16   |     |   (0) comments


For many operators, the gigabit evolution begins with the shift from DOCSIS 3.0 to DOCSIS 3.1. But that move represents a change not only in the protocol itself, but in the approach to architecting their entire DOCSIS delivery chain -- from the headend to the outside plant and home gateway components.

Jonathan Ruff, senior director of global technical ...

LRTV Interviews
Level 3 VP: Enterprises Need More for Less

9|29|16   |   05:27   |   (0) comments


Andrew Dugan, Level 3 group vice president of global technology and IT, says enterprises need more bandwidth and they need it faster and with greater security, but they want to spend less, if possible. They are looking to carriers to reduce their network complexity and help protect them from cyberattacks as well.
LRTV Interviews
CenturyLink: SDN/NFV Pose New Interconnection Possibilities

9|28|16   |   04:37   |   (0) comments


Network operators should develop new APIs and business processes for reselling virtual assets to each other, says CenturyLink's Bill Walker. That will enable them to build digital business portfolios that help them avoid becoming commodity transport providers.
LRTV Interviews
Level 3: Overcoming Terror of Being Supplier, Integrator & Developer

9|28|16   |     |   (0) comments


At Light Reading's NFV & Carrier SDN event in Denver, Travis Ewert of Level 3 Communications said there is terror in becoming supplier, integrator and developer, but it can be overcome and be cost effective.
LRTV Custom TV
Introducing IoT World News

9|27|16   |   01:43   |   (0) comments


Self-driving cars, medical sensors, smart cities... and refrigerators. In order to address the huge scope of IoT, KNect365 has created a unique online community that will help businesses to understand and monetize the opportunities that live within the IoT market. We look forward to welcoming you to IoT World News -- your gateway to a better connected future.
LRTV Interviews
AT&T: Reusable Functions Next NFV Key

9|27|16   |   06:03   |   (0) comments


The next generation of NFV has to break functions down into reusable software chunks, making everything much more cloud-like.
LRTV Interviews
Masergy on Security: Attackers Gaining Upper Hand

9|27|16   |   5:10   |   (2) comments


At Light Reading's NFV & Carrier SDN event in Denver, Ray Watson, vice president of Global Technology at Masergy, says that because of the growth in virtualization, the threat landscape is shifting in favor of the attackers. As a result, service providers need to think beyond just defending the perimeter and take a more holistic approach to security.
LRTV Interviews
Verizon Takes Next Step on Biz Virtualization Journey

9|26|16   |   4:38   |   (2) comments


At September's NFV & Carrier SDN event in Denver, Light Reading sat down with Victoria Lonker, director of Product and New Business Innovation at Verizon, to chat about where the carrier is with delivering virtualized services to business customers.
LRTV Interviews
Global Services: The $40B Face-Off

9|26|16   |   05:53   |   (1) comment


More service providers than ever before are battling it out to win a slice of what is now a $40 billion global communications services pie, explains Ovum Principal Analyst David Molony.
LRTV Documentaries
MEC Congress: The Key Takeaways

9|22|16   |   03:25   |   (3) comments


Three key takeaways from the Mobile Edge Computing (MEC) Congress in Munich, Germany.
Upcoming Live Events
November 3, 2016, The Montcalm Marble Arch, London
November 30, 2016, The Westin Times Square, New York City
December 1, 2016, The Westin Times Square, New York, NY
December 6-8, 2016, The Westin Excelsior, Rome
May 16-17, 2017, Austin Convention Center, Austin, TX
All Upcoming Live Events
Infographics
Hot Topics
Eurobites: Telefónica Taps Juniper for Network Security
Paul Rainford, Assistant Editor, Europe, 9/26/2016
AT&T CEO Backs Black Lives Matter
Dan Jones, Mobile Editor, 9/30/2016
Powell Kills the Cable Show
Mari Silbey, Senior Editor, Cable/Video, 9/29/2016
Telstra Sees Quadrupled Data Capacity by 2020
Carol Wilson, Editor-at-large, 9/28/2016
From Philly, With Love
Alan Breznick, Cable/Video Practice Leader, Light Reading, 9/30/2016
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
Light Reading CEO Steve Saunders and UXP Systems CEO Gemini Waghmare discuss the strategic importance of digital identity for operators in the midst of transformation.
Join us for an in-depth interview between Steve Saunders of Light Reading and Alexis Black Bjorlin of Intel as they discuss the release of the company's Silicon Photonics platform, its performance, long-term prospects, customer expectations and much more.
Animals with Phones
There's Nothing Like Missing a Full Minute of Pokémon Go Click Here
Live Digital Audio

A vital part of increasing the number of women in comms is transforming the ways companies can support and empower women. While progressive company policies that support both men and women in achieving work-life balance are a step in the right direction, creating a company culture that supports those policies can at times be more challenging.

During this show, we'll talk to Lynn Comp, Senior Director of Industry and Sales Enabling (ISE) in the Network Platforms Group at Intel, about why those challenges exist and how companies can overcome them. She'll provide insight into how Intel has worked to create a culture that supports work-life balance, and provide steps and guidance for other companies wishing to do the same. We will also leave plenty of time to get your questions answered live on the air.