Thursday, July 18 2024

A recent EU report demands a crackdown on Chinese technology companies Huawei and ZTE, escalating discord with Beijing. The report marks a second step in evaluating the implementation of the “5G cybersecurity toolbox,” published in January 2020.

The toolbox is designed to bolster mobile network security requirements, evaluate suppliers’ risks, limit any reliance on a sole vendor, and spur 5G innovation within the EU. It also advises against sourcing 5G equipment used in Radio Access Networks from “high-risk suppliers.” 

According to the latest report, most member states have implemented the toolbox’s security requirements, enabling countries to exclude suppliers based on assessed security risk. The report urges the remaining member states to swiftly enact laws to reflect the toolbox requirements and adopt relevant provisions in the interim. 

However, only ten member states have used the laws to constrain or eliminate high-risk suppliers. Just three of them are in the process of adopting legislation, fostering security risks and over-reliance on single suppliers. EU commissioner for internal market Thierry Brenton described this progress as “too slow” in a speech regarding the new report, highlighting that quicker advancement is essential to “economic security and sovereignty.”  

Member states are also directed to impose restrictions on Huawei and ZTE, which were found to represent “materially higher risks than other 5G suppliers.” The two telecommunication companies based in China have long been scrutinized for their security practices and relationship with the Chinese government. The U.S. and U.K., among others, have already banned them from operating within their 5G networks. The report affirms such measures by member states, calling them “justified” and “compliant” with toolbox standards.  

The EU will also be taking action to cut ties with network services that use these companies as suppliers and will work with member states and telecom providers. They will progressively discontinue them from the current network services of the commission sites, and all future decisions concerning funding programs will be based on similar security risk assessments.  

The report has also issued new recommendations to fulfill the vision of the toolbox. Some recommendations are guaranteeing member states have complete information from mobile network operators about their 5G equipment and quickly removing any equipment.

The toolbox asks member states to maintain a “strong level of supervision.” When assessing suppliers’ risk profiles, it asks to consider other member states’ security designations to promote consistency across the union. 

China has denounced these recent developments, saying the proposed restrictions are groundless. Huawei and ZTE continue to reject claims that their technology poses risks to national security.


Cyber Executive Moves: Booz Allen, Binarly, Rokt, and More


Ermes Raises Initial €3M Series A

Check Also


Don’t Miss

Sevco Security Platform Product Review

Ellie Buscemi

What is the Sevco Security Platform? The Sevco Security Platform is a cyber asset attack service management (CAASM) product that focuses on aggregating and correlating data from across a company’s cybersecurity infrastructure to give cybersecurity professionals a better sense of what the company’s infrastructure looks like as a whole. The platform’s sources include a company’s […]

Cyber Deals: Huntress, Cyberhaven, and SpyCloud


Cybersecurity Surge: Top Funding Rounds and Strategic Acquisitions Fuel Growth in AI, Cloud Security, and Threat Prevention Solutions

Fidelis Elevate: A Deep Dive

Ellie Buscemi

What is Fidelis Elevate? Fidelis Elevate is an open extended detection and response (open XDR) solution focusing on network protection, endpoint security, and cyber attacker deception. The platform aims to protect various elements of a company’s infrastructure, such as devices and servers while tracking suspicious behavior and preventing access to cyber criminals. What features does […]

Partially closed laptop screen

Best Extended Detection and Response (XDR) Solutions

Lara Oporto

What is Extended Detection and Response and how does it work? Extended Detection and Response (XDR) is a cybersecurity system that gathers information from different places like computers, networks and emails. Unlike other security tools that focus on one area like computers or networks, XDR looks at everything together. The comprehensive approach helps to find […]

Close up of computer chip

Best Managed Detection and Response (MDR) Solutions

Lara Oporto

What is Managed Detection and Response? Managed Detection and Response (MDR) is a cybersecurity service that provides continuous monitoring, threat detection and incident response capabilities. MDR achieves these capabilities through the deployment of advanced technologies such as machine learning and behavioral analytics as well as analysis from security professionals. MDR is a cybersecurity service that […]

Best Hyperconverged Infrastructure Software

Ellie Buscemi

What is Hyperconverged Infrastructure and how does it work? Hyperconverged infrastructure (HCI) is a software that provides computing, storage and network operations for a company from a single point on a company’s hardware. Originally, computing, storage and network operations were divided in a company’s hardware infrastructure and potentially provided by separate vendors with different management […]