Security Gaps Imperil Private 5G Networks Amid AI Boom
Rhea-AI Summary
Trend Micro (TYO: 4704) released joint research with CTOne highlighting security concerns in private 5G networks despite AI adoption. The study reveals 86% of organizations currently use private 5G networks, while 14% are evaluating deployment.
Key findings show that 62% of organizations currently use AI-powered security tools for private 5G networks, with 35% planning implementation. Top AI capabilities deemed essential include predictive threat intelligence (58%), continuous authentication (52%), and zero trust enforcement (47%).
However, significant challenges persist: 47% cite high costs, 44% worry about false positives/negatives, and 37% lack internal expertise. Only 20% of organizations have dedicated communications technology security teams, with just 18% of security budgets allocated to private 5G networks. Furthermore, only 54% ensure GDPR compliance, and 51% encrypt data at rest and in transit.
Positive
- 86% market penetration in private 5G networks
- 62% adoption rate of AI-powered security tools
- Strong demand for predictive threat intelligence (58%)
Negative
- Only 18% of security budget allocated to 5G networks
- Only 20% have dedicated security teams
- Low GDPR compliance rate (54%)
- High implementation costs (47% cite as challenge)
- Weak data protection (51% encrypt data)
News Market Reaction
On the day this news was published, TMICY gained 0.88%, reflecting a mild positive market reaction.
Data tracked by StockTitan Argus on the day of publication.
New research reveals next-gen private wireless network deployments are surging, but lack of
proactive security measures raises serious concerns
To learn more about Trend and CTOne's activities at MWC Barcelona 2025, please visit: https://resources.trendmicro.com/Mobile_World_Congress_MWC_2025_LP.html
Rachel Jin, Chief Enterprise Platform Officer at Trend: "Not all AI security is created equal, and some organizations are putting themselves at risk due to lack of know-how. Proactive attack surface management is crucial for private 5G networks, where any oversight can open the door to compromises. Security leaders must combine AI-powered protection with a deep understanding of technology and cyber risk to safeguard these critical environments."
Private 5G networks are booming thanks to their use across critical industries including energy and utilities, military, logistics, healthcare, and smart manufacturing.
IT and cybersecurity professionals also appear to understand the potential benefits of AI-powered security in these environments: nearly all said they are either currently using (
They view the following AI-powered capabilities as essential in this regard:
- Predictive threat intelligence (
58% ) - Continuous, adaptive authentication (
52% ) - Zero trust enforcement (
47% ) - Self-healing networks featuring AI automation (
41% )
Jim Frey, Principal Analyst, Networking for ESG: "Organizations are finding great operational value from private 5G networking, often as a part of AI projects. But they must ensure that their security operations center is prepared to monitor and protect this emerging communications technology. Cybersecurity providers that can deploy proactive risk management, attack path prediction, and other proactive measures will be well positioned to help protect private 5G and AI architectures."
More than nine in ten organizations currently using AI security admit to facing challenges in deploying the tech to private 5G networks. High costs (
A lack of in-house CT know-how is reflected in the fact that just a fifth (
Jason Huang, CEO at CTOne: "As enterprise use of private and public mobile networks accelerates, we are seeing new challenges that demand specialized CT security capabilities. Organizations need the ability to secure end-to-end combined broad visibility that fits with SecOps needs, enabling them to manage their enterprise attack surface risk as it expands to support new wireless applications."
On average, less than a fifth (
Trend's research revealed that organizations may be unwittingly exposing themselves to cyber and compliance risks by failing to safeguard use of AI for traffic monitoring/analysis.
Specifically, only around half or fewer respondents said that they:
- Ensure compliance with data privacy regulations like GDPR (
54% ) - Encrypt data at rest and in transit (
51% ) - Deploy strict access controls for AI models (
50% ) - Use data anonymization techniques (
44% )
*Trend Micro & CTOne commissioned Sapio Research to survey 800 managers or above, with decision making authority over IT and / or cybersecurity across the US,
About Trend Micro
Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's AI-powered cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, Trend's platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 70 countries, Trend Micro enables organizations to simplify and secure their connected world. www.TrendMicro.com.
About CTOne
CTOne, a global cybersecurity leader in communication technology (CT), helps organizations better manage their ever-expanding attack surface risk. As a subsidiary of cybersecurity leader Trend Micro, CTOne leverages 35+ years of experience to bridge the IT/CT expertise gap with an AI-powered solution for mobile deployments. With deep threat and attack expertise combined with comprehensive security for mobile deployments, CTOne delivers visibility and protection across mobile endpoints and network infrastructure in support of enterprises using private 5G for competitive advantage. Always on guard, CTOne helps organizations securely drive digital transformation, reduce operating costs, increase productivity, and avoid losses from CT-related attacks. https://www.ctone.com