* [Blog](https://www.paloaltonetworks.com.au/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com.au/blog/corporate/) * [Public Sector](https://www.paloaltonetworks.com.au/blog/category/public-sector/) * A Security-First Approach... # A Security-First Approach to 6G [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2024%2F11%2Fa-security-first-approach-to-6g%2F) [](https://twitter.com/share?text=A+Security-First+Approach+to+6G&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2024%2F11%2Fa-security-first-approach-to-6g%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2024%2F11%2Fa-security-first-approach-to-6g%2F&title=A+Security-First+Approach+to+6G&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com.au/blog/2024/11/a-security-first-approach-to-6g/&ts=markdown) \[\](mailto:?subject=A Security-First Approach to 6G) Link copied By [Leonid Burakovsky](https://www.paloaltonetworks.com/blog/author/leonid-burakovsky/?ts=markdown "Posts by Leonid Burakovsky") and [Katie Strand](https://www.paloaltonetworks.com/blog/author/katie-strand/?ts=markdown "Posts by Katie Strand") Nov 13, 2024 4 minutes [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [policy](https://www.paloaltonetworks.com/blog/tag/policy/?ts=markdown) [Zero Trust](https://www.paloaltonetworks.com/blog/tag/zero-trust/?ts=markdown) This summer, the Federal Communications Commission (FCC) officially launched its ninth[Communications Security, Reliability, and Interoperability Council (CSRIC)](https://www.fcc.gov/communications-security-reliability-and-interoperability-council-ix) -- a stakeholder-driven body advising the FCC on ways to ensure the security, reliability and interoperability of communications systems. Palo Alto Networks is pleased that its expertise has been tapped once again with the appointment of Leonid Burakovsky, vice president of Product Management, to the CSRIC Working Group 3: Preparing for 6G Security and Reliability. It's no secret that 5G technology has brought significant improvements in several key areas of mobile connectivity. This includes increased speeds, reduced latency, greater flexibility, density improvements, better energy efficiency and a transformation toward intelligent networks integrated with artificial intelligence (AI). However, these advancements are not without security challenges, including significant cybersecurity risks. The increasing reliance on mobile networks, including private 5G, for critical infrastructure, autonomous systems, manufacturing, energy and transportation underscores the necessity for a security approach that can detect and withstand sophisticated cyberthreats and attacks. With this backdrop, and recognizing that the [FCC highlights](https://www.google.com/url?q=https://www.fcc.gov/communications-security-reliability-and-interoperability-council-ix&sa=D&source=docs&ust=1731434057335819&usg=AOvVaw3Hb42WoSwLN3IwYXZe34SI) that "6G networks are at least seven years from commercial deployment," we should prepare for its inevitable deployment from the most proactive posture possible. Central to doing so is studying 5G security lessons learned, as these will play a critical role in informing the security landscape of the forthcoming generation. A robust security approach should be established from the beginning in all 6G discussions. Palo Alto Networks strongly encourages a "Security First" approach to complement the existing focus on improvements in speeds, latency, coverage and other connectivity elements. While these elements are important, driving progress across them without a commensurate focus on security will fundamentally challenge the promise of 6G connectivity. ## Next-Generation Security --- What We've Learned The adoption of 5G technology has presented new security risks, given the increased attack surface from cellular IoT and OT devices and new threat vectors as cloud and AI adoption surges. According to [The State of OT Security 2024 report,](https://www.paloaltonetworks.com/resources/research/state-of-ot-security-report?utm_source=google-jg-amer-cdss-smco-sent&utm_medium=paid_search&utm_campaign=google-cdss-ot-amer-multi-lead_gen-en-eg&utm_content=7014u000001eHHTAA&utm_term=ot%20security&cq_plac=&cq_net=g&gad_source=1&gclid=EAIaIQobChMIx9qFs8nXiQMVF87CBB3ZDwwYEAAYASAAEgJjcPD_BwE) conducted in collaboration with ABI Research, more than 70% of industrial enterprises acknowledge that 5G-connected devices are becoming an increasing threat vector for 5G-OT deployments. To protect the confidentiality, integrity and availability of data and to protect networks, services and consumers, we must standardize a Zero Trust approach to enterprise-grade security. This is necessary to manage increasingly complex and dynamic environments. This means the ability to secure the service, technology and application stack by securing all layers (signaling, data, applications and management), all locations, all attack vectors and all software lifecycle stages while using AI, automation and behavior analysis. At Palo Alto Networks, an end-to-end, Zero Trust approach is at the core of our enterprise-grade security offering for 5G. We provide secure network slicing, real-time detection of attacks, threats and vulnerabilities, automatic correlation to subscribers and equipment, and dynamic, flexible real-time security enforcement, integrating a high degree of AI and automation, so customers can manage security efficiently. While vendor trust is important, it alone does not guarantee security. Our capabilities incentivize vendor best practices while securing modern telecom networks, communications and data regardless of the underlying technology or ICT vendor in the network. This flexibility is crucial, particularly as 6G networks are expected to integrate even more devices and applications, leading to an exponentially expanded attack surface, necessitating proactive and adaptive security measures. 5G and 6G can transform industries and drive the Industrial Revolution beyond connectivity. For cellular networks to live up to this potential of transforming industries, enterprises need the confidence that 5G and 6G provides Zero Trust, enterprise-grade security. ## Next Steps By investing in Zero Trust security technologies now, organizations can lay the groundwork for a secure 6G environment, thereby ensuring the integrity of data and critical services, as well as fostering confidence in the digital ecosystem of the future. Incorporating the latest Zero Trust, enterprise-grade security technologies into 6G requirements and standardization from the beginning is crucial to powering digital transformation and ensuring secure and speedy adoption of 6G. AI and automation should be at the core of network security to analyze vast amounts of telemetry, proactively assist in intelligently detecting and stopping attacks and threats, including zero-day attacks, and dynamically recommend changes to security policies, if needed, based on continuous security monitoring and real-time behavior analyses. The risk of cyberattacks to all organizations has exponentially grown with the scale enabled by 5G. The stakes are too high not to prioritize security in the development and deployment of 6G. *** ** * ** *** ## Related Blogs ### [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Palo Alto Networks Zero Trust Platform Featured in New NIST Guidance](https://www.paloaltonetworks.com.au/blog/2024/08/zero-trust-platform-featured-in-new-nist-guidance/) ### [AI Governance](https://www.paloaltonetworks.com/blog/category/ai-governance/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Improving National Security Through Secure AI](https://www.paloaltonetworks.com.au/blog/2025/05/improving-national-security-through-secure-ai/) ### [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [News \& Events](https://www.paloaltonetworks.com/blog/sase/category/news-events/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Modernizing Federal Security with Prisma Access](https://www.paloaltonetworks.com.au/blog/2025/04/modernizing-federal-security-with-prisma-access/) ### [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### 10 Cyber Recommendations for the Trump Administration](https://www.paloaltonetworks.com.au/blog/2025/02/10-cyber-recommendations-trump-administration/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### A Decade of Trust --- Meeting the Needs of the DoD](https://www.paloaltonetworks.com.au/blog/2024/03/meeting-the-needs-of-the-dod/) ### [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### Zero Trust: The Key to a Hybrid Workforce](https://www.paloaltonetworks.com.au/blog/2023/06/zero-trust-the-key-to-a-hybrid-workforce/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com.au/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language