ADVERTISEMENT
Saturday, May 2, 2026
Tech | Business | Economy
No Result
View All Result
  • Technology
    • Trends
    • Telecoms
      • Broadband
    • ConsumerTech
      • Gadgets and Appliances
      • Apps
      • Accessories
      • Reviews
      • Unboxing
    • EnterpriseTECH
    • Security & Data Protection
    • How To
    • GameTech
  • Business
    • Company News
    • StartUPs
      • Founder’s Story
      • Funding
    • Deals
    • People & Moves
    • SME & Entrepreneur Focus
    • BUSINESS SENSE FOR SMEs
    • Competition & Market Positioning
    • Commerce & Mobility
    • Travel
    • WomenPreneurs
  • Economy
    • Macroeconomic Trends
      • Macro Monday
      • TE Insights
    • Finance
      • Banks
      • Fintech
      • Insurance
      • Digital Assets
      • Personal Finance
    • Policies
      • Tech & Society
    • Market Analysis
    • Jobs & Workforce Economy
  • Features
    • Guest Writer
      • Chidiverse
      • Digital Assets
    • EventDIARY
    • IndustryINFLUENCERS
    • MarkTECH
    • TBS
    • NewsEXTRA
  • Editorial
  • Brand Content
  • TECHECONOMY TV
Saturday, May 2, 2026
Tech | Business | Economy
No Result
View All Result
Tech | Business | Economy
No Result
View All Result

Home » EU’s PEGA Committee Adopts 8 Recommendations on Telecom Networks

EU’s PEGA Committee Adopts 8 Recommendations on Telecom Networks

Techeconomy by Techeconomy
June 21, 2023
in Telecoms
Reading Time: 3 mins read
0
EU PEGA Committee

EU PEGA Committee

Enea has welcomed the PEGA Committee’s adoption of the eight telecom network recommendations to address the critical gaps which persist in protective frameworks.

The Committee was set up by the European Parliament to investigate Pegasus and equivalent surveillance threats.

The committee held its final vote on June 15 and all eight recommendations were adopted to safeguard mobile communications. 

Rowland Corr, Vice President of Government Relations at Enea said: “These recommendations by PEGA are of vital importance to telecom network operators. Firstly, it recognizes the gaps at various levels today – including technical and institutional, regulatory and doctrinal, national and international – which leave mobile subscribers vulnerable to more than just the misuse of spyware by attackers. Secondly the recommendations also highlight areas for concrete measures to close those systemic gaps, emphasizing the need for national authorities to evaluate, and for operators to mitigate the cyber surveillance threat posed by mobile signalling attacks. Member states will need to invest in critical infrastructure to detect and defend against unauthorized intrusions over signaling.”

The recommendations include:

  1. Revoking the licenses of (2G – 5G) service providers found to be facilitating unlawful access to national and/or international mobile signaling infrastructure.
  2. Regulating the processes through which malicious actors can create new phone numbers from all over the world.
  3. Requiring telecom providers to have the capacity to detect potential misuse of access, control, or effective end use of signaling infrastructure gained by third parties.
  4. Compelling Member States to evaluate telecom providers’ level of resilience to unauthorized intrusions
  5. Necessitating telecom providers to take firm and demonstrable action to mitigate against various forms of unauthorized surveillance.
  6. Requiring Member States to take action to ensure that non-EU state actors that do not respect fundamental rights do not have control or effective end use of strategic infrastructure, or influence over decisions related to strategic infrastructure within the Union, including telecommunications infrastructure.
  7. Prioritizing greater investment in the protection of critical infrastructure, such as national telecommunications systems, to address gaps in protection against privacy breaches, data leaks, and unauthorized intrusions.
  8. Calling on national authorities to strengthen providers’ capabilities to identify and report illegal targeting, to mitigate security gaps exploited by malicious actors

Earlier this year, Rowland Corr, was one of several industry experts invited to share his expertise. Corr highlighted the wider threat of unauthorized intrusions beyond the use of spyware which pose the same fundamental societal threats.

Subscribe to our Telegram channel for the latest updates.

Follow the latest developments with instant alerts on breaking news, top stories, and trending headlines.

Join Channel

Corr concluded: “We applaud the PEGA Committee for its work in developing and adopting these critical recommendations Enea is committed to supporting EU stakeholders in implementing these vital recommendations and making mobile networks more secure.”

The full list of recommendations from the European Parliament published in May is available here. 

0Shares

Previous Post

Harnessing Artificial Intelligence for Informed Decision-Making in Governance 

Next Post

Here’s Seven Top Factors to Consider for Effective Mobile Cloud

Techeconomy

Techeconomy

Related Posts

Nairtime and Airtime access

Nairtime Hails Court Order Securing Airtime, Data Access for Millions of Nigerians

April 30, 2026
EVC of NCC, Dr. Aminu Maida | 14-Day SIM Deactivation Notice | Nigeria's Broadband Penetration | CNI and Edo

CNI: NCC Commends Edo Gov’t for Protecting Telecom Infrastructure during Construction

April 30, 2026

Edoyemi Ogoh Explains Why NCC Shifted QoS Sanctions to Direct Subscriber Compensation

April 30, 2026
Load More
Next Post
Mobile Cloud solutions

Here’s Seven Top Factors to Consider for Effective Mobile Cloud

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Techeconomy Podcast
Techeconomy Podcast

The Techeconomy Podcast is a thought-leadership show exploring the powerful intersection of technology, business, and the economy, with a strong focus on Africa’s fast-evolving digital landscape.

PROTECTING INNOVATION IN AFRICA’S STARTUP ECOSYSTEM
byTecheconomy

Protecting Innovation in Africa’s Startup Ecosystem . A timely conversation for the future of African entrepreneurship.

PROTECTING INNOVATION IN AFRICA’S STARTUP ECOSYSTEM
PROTECTING INNOVATION IN AFRICA’S STARTUP ECOSYSTEM
April 29, 2026
Techeconomy
BUILDING TRUST IN AFRICA ECOSYSTEM
February 27, 2026
Techeconomy
Navigating a Career in Tech Sales
January 29, 2026
Techeconomy
How Technology is Transforming Education, Health, and Business
November 27, 2025
Techeconomy
INNOVATION IN MOBILE BANKING
October 30, 2025
Techeconomy
Search Results placeholder
  • About Us
  • Careers
  • Contact Us
  • Privacy Policy

© 2026 TECHECONOMY.

No Result
View All Result
  • Technology
  • Business
  • Economy
  • Features
  • Editorial
  • Brand Content
  • TECHECONOMY TV

© 2026 TECHECONOMY.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.