March 24, 2026

Why Securing Tomorrow’s Mobile Networks Can’t Wait

Rich Baich
Rich Baich Chief Information Security Officer, AT&T

Mobile networks are quietly undergoing one of the biggest transformations in their history. They’re becoming open, software-driven, and increasingly powered by artificial intelligence. The benefits will be great, but the security risks need to be managed.

That’s why we want to highlight a new paper written jointly by AT&T and Ericsson experts. It tackles a question the entire industry is now facing: How do we secure mobile networks that are more open, more automated, and more intelligent than ever before?

The short answer is that yesterday’s security playbook isn’t enough.

A network that’s open by design and necessity

Modern 4G and 5G networks were built to be open. Network components communicate through standardized interfaces. Software runs in cloud environments instead of purpose-built hardware. Operators can mix and match vendors and update software far more quickly than in the past.

This openness brings real benefits – innovation, resilience, speed – but it also introduces new risks. More interfaces, more software, and more third-party code mean more opportunities for bad actors if security doesn’t keep pace.

The paper makes this key point: Openness isn’t the problem. Failing to secure it is. Industry standards, strong encryption, identity-based access, and disciplined software practices are what allow open networks to remain trustworthy at scale.

AI is a game changer and a new target

Artificial intelligence is rapidly becoming part of how mobile networks run themselves. AI helps steer traffic, detect faults, save energy, and even spot suspicious activity faster than humans can.

But AI introduces a new reality: It can be both a shield and a target.

The paper outlines how AI systems can be attacked through poisoned data, manipulated inputs, stolen models, or compromised supply chains. These risks are well-documented by organizations like NIST and OWASP, yet they remain difficult to detect in real time.

That’s why the authors argue that AI needs its own layer of security controls beyond traditional IT protections. These include tighter access controls, model integrity checks, privacy safeguards, and continuous monitoring. Just as important, AI must also be used as part of the defense itself, helping operators identify threats that move faster and more stealthily than ever before.

Preparing for the quantum era before it arrives

One section of the paper addresses quantum computing. While practical quantum attacks may still be years away, the impact on today’s encryption could be profound.

Quantum capable systems could eventually break widely used cryptographic methods, putting long‑lived data and critical infrastructure at risk. The paper argues that mobile networks must begin preparing now for crypto agility, post-quantum algorithms, and network transitions that don’t disrupt performance or reliability.

In other words, waiting until quantum threats are “real” may already be too late.

Security is a team sport

A consistent theme in the paper is collaboration. No single operator or vendor can see every threat. That’s why we highlight industry cooperation, secure development practices, rigorous testing, and information-sharing efforts.

The authors also emphasize the modern security mindset of assuming the adversary is already inside the network. Zero Trust Architecture, continuous monitoring, and rapid software updates are no longer optional. They’re foundational to protecting critical communications infrastructure.

Why you should read this paper

This paper doesn’t just catalog risks. Our experts explain why security must evolve alongside technology and what practical steps the industry is already taking to do so. It connects AI, open architectures, and quantum readiness into a single, coherent security story.

If you care about the future of connectivity as a policymaker, business leader, or technology partner, this is important reading.

The networks we depend on every day are changing. Securing them requires clear vision, shared responsibility, and action now. AT&T and Ericsson will continue leading the communications industry to secure 5G and evolving 6G networks.