• Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Intelligence

White Paper

HardenStance: Defending telecoms against nation state cyber threats

Jun 17, 2022
asset thumbnail

By Patrick Donegan, Principal Analyst, HardenStance

This white paper examines the escalation of cyberattacks against telecom operators by nation-states and private actors. It reviews the more advanced and complex threat vectors in use against national infrastructure, including telecom networks, providing guidance on how best to defend against them.

Written by Harden Stance and sponsored by Palo Alto Networks, this white paper makes several important observations about the evolving nature of these threats to telecom infrastructure, including:

  • Nation states are increasingly willing to take higher risk in offensive cyber operations to undermine an adversary’s national security.
  • Nation state proxies and organized cybercrime gangs can pose as much of a national security risk as direct threats with boundaries between these different threat groups breaking down, risking greater escalation.
  • Nation states are using increasingly complex and advanced threat vectors.
  • Governments will get increasingly prescriptive about defending telecom networks. Weaknesses in a telco’s enterprise IT security present as much of a risk as weaknesses in the security of its telecom network.

Download the white paper now to understand the full dimensions of the threats posed and the best practices for preventing exploits.

 

* The views expressed in this white paper are those of the author and do not represent an official Palo Alto Networks position.

Download
Share page on facebook Share page on linkedin Share page by an email
Related Resources

Access a wealth of educational materials, such as datasheets, whitepapers, critical threat reports, informative cybersecurity topics, and top research analyst reports

See all resources

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved