Nokia opens 5G security test lab dedicated to cybersecurity

Finnish telecommunications equipment provider Nokia is launching its advanced security research and testing lab in Dallas, Texas, describing it as the first end-to-end cybersecurity-focused 5G test lab.

The lab will go beyond looking at individual network elements and focus on the broader context of network use and abuse scenarios, Nokia says.

Nokia provides context: 5G continues to see the nature and scale of information networks evolve as well as the scale of security threats.

However, this scale has left vulnerabilities, with Nokia warning that there are now more avenues of attack open to hackers, state actors and corporate espionage due to interworking terminals, use intensive use of open source software and the large-scale use of 5G.

As a central lab dedicated solely to security forensics and research, the Advanced Security Testing and Research (ASTaR) lab will use and develop tools and techniques to assess the security resilience of 5G networks, as well as their associated software, hardware and applications.

ASTaR will assess results to address emerging security threats. Lab researchers will work with the cybersecurity community to identify emerging threat vectors and potential vulnerabilities.

“5G will enable countless new services for consumers, government and businesses, and industry must be extremely vigilant to ensure the security of these 5G ecosystems. To demonstrate our leadership and commitment to security, Nokia will be the first to inaugurate a lab in the United States with the unique mission of identifying and preventing cybersecurity attacks. The AStar lab will be an ideal testing ground to assess security in the broader context of network use and abuse scenarios,” said Nishant Batra, Chief Strategy and Technology Officer, Nokia.

Nokia says the lab will share its cybersecurity knowledge with its business and government customers.

Nokia will partner with its customers to consider network attack scenarios and observe how security measures will perform against real security incursions.

The AStar lab will be staffed by US-based cybersecurity specialists and is located on the Nokia campus in Dallas.

AStar will leverage the security research capabilities of Nokia Bell Labs.

Nokia’s Dallas office also includes the Executive Experience Center, Energy Innovation Center, O-RAN Collaboration and Testing Center, Cloud Collaboration Hub, and Nokia Services Lab.

This first appeared in the CommsWire subscription newsletter on May 10, 2022.


The last year has seen a meteoric rise in ransomware incidents around the world.

Over the past 12 months, threat researchers at SonicWall Capture Labs have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available through the SonicWall Cyber ​​Threat Report 2022, which ensures that SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the growing wave of cybercrime.

Click the button below to get the report.



It’s all about webinars.

Marketing budgets are now focused on webinars combined with lead generation.

If you want to promote a webinar, we recommend at least a 3-4 week campaign before your event.

The iTWire campaign will include numerous advertisements on our news site and a major newsletter promotion and promotional and editorial news. Plus a keynote speaker video interview on iTWire TV which will be used in promotional messages on the iTWire homepage.

Now that we are coming out of Lockdown, iTWire will focus on supporting your webinars and campaigns and support through partial payments and extended terms, Webinar Business Booster pack and other support programs. We can also create your advertisements and written content and coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Comments are closed.