Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity & Business Resilience

The vulnerability of satellite communications

By Thorsten Stremlau
security must be top of the agenda for satellite communications
April 19, 2021

Over the past decade or so, we’ve witnessed the increasingly significant role satellites play in today’s technology, from providing geolocation capabilities to enabling logistics and navigation, to the intelligence gathering conducted by nation states. The satellite industry has seen a resurgence over the past few years, and is now in a prime position to play a key role in meeting the ever-growing market demands, such as 5G backhaul and the Internet of Things (IoT).

However, an increase in the deployment of satellites have left space-based assets a target for hackers looking to compromise sensitive information, with potentially devastating consequences. With the stakes so high when it comes to protecting the data that satellites carry, security cannot be an afterthought. It must play an integral part of the design process itself.

Meeting the demand

With connectivity demands ever rising, we are now seeing the early deployment of 5G starting to take place. This has led to a new space race among technology organizations to deploy constellations that deliver the high-speed connectivity, bandwidth and capacity, that is needed to satisfy demand. Users expect to have the same quality of connectivity anytime, anywhere, and satellite communications will extend 5G networks to rural and hard-to-reach areas, such as boats and trains. When it comes to creating a safe and secure connected experience, satellites will have a major part to play and security considerations will need to be made in real time.

Satellite ground technology is also advancing with more innovation and scalability, as it looks to leverage virtualization, orchestration and network splicing to support 5G connectivity. Software-defined satellites that can be reprogrammed to move capacity depending on the market need, are now a must-have for the industry to enable future growth. With so many new 5G and IoT applications connections as potential doors for hackers, satellites are the gateway responsible.

However, amongst the innovation and excitement, security can often be left behind. The reality is that as more satellites are deployed, more satellites must be protected, and it is crucial that organizations consider how their systems may be potentially compromised by hackers. There was a time when satellites were seen to be almost untouchable, however now it is relatively simple for hackers to purchase and operate the right equipment in a way that is a cause for concern. Almost anyone can aim an antenna at a satellite and send communication to it, so it is critical that a level of trust is established between earth bound devices and satellites.

The challenge of security in space

Security is the most significant area of technical concern for most organizations deploying IoT systems and now 5G networks, with multiple devices connected across networks, platforms and devices. This is also true for satellite, given the size and scope, as well as the number of earth station access points. The rise in IoT means if one single device isn’t encrypted or the communication isn’t protected, a bad actor can manipulate it and potentially a whole network of connected devices. It isn’t just the devices themselves that need to be protected, but it is also every stage of data transmission too.

A key first step is for organizations to understand the vulnerabilities they have and how they can be exploited. For example, many organizations are working with legacy satellite communications that are not easily updated. Significant testing must be completed to ensure upgrades for communication with next-generation platforms will not interfere or impact other key system functions. Weak encryption and old IT equipment are key vulnerabilities for satellite networks, which are a prime target for hackers to exploit.

Ensuring cyber resiliency

The good news is that as satellite communications have advanced, so have the security solutions that protect them. Trusted computing technology, such as the standards developed by TCG, ensure trustworthiness of devices, device identity and security validity, such as through the use of cryptographic keys. Security options provide building blocks to create secure systems, for every risk level and size.

Network security infrastructure enables communications to be authenticated at every stage of data transmission that gets sent to the earth-bound devices, before it gets sent up to the satellite. This allows the earth-side devices to become effective firewalls to prevent possible end of denial service attacks that can be sent up to satellites, when it could be too little, too late. Even with huge volumes of satellites and devices communicating, the satellite will ignore communication if authentication has not been successful. This plays a key role in establishing overall satellite network visibility by ensuring the devices that are communicating meet compliance requirements, have access control and provide orchestration. By encrypting communication at the networking level, data is also protected when traveling across the satellite ecosystem.

Practical security solutions rely on a special component within a device called a root of trust. A root of trust forms the foundation of the device and is secured for a defined range of applications. They undergo in-depth security validation and once deployed, they remain trusted throughout a device lifetime. This is a huge advantage when we think about the thousands more devices we’ll see as a result of IoT and 5G.

A root of trust is a key aspect of security, as it is the generation, storage, and protection of a cryptographic device identity, which serves as the all-important vehicle for demonstrating trust worthiness.

Connectivity from the ground up

Network security must be the first consideration during the design stage for communications. It is crucial that the reliability and integrity of the network is guaranteed, as well as protecting a company’s reputation. The fall out of a cyberattack can cause significant damage, from financial losses to fines for failing to comply with data protection legislation. A casual approach to security could make a huge dent in an organization’s finances, or put them out of business completely.

Satellites are already being used across critical organizations, including militaries, governments and healthcare, increasing the stakes of a cyberattack. But no matter the size or purpose of an organization, security must be top of the agenda.

Real-time security solutions must be implemented to allow for trusted relationships between interconnected devices. Any that do not operate in real-time present a real issue, as hackers can infiltrate a system and be out in seconds. As technology advances, security must be comprehensive and future proof. It cannot be an afterthought. There is simply too much for organizations to lose.

KEYWORDS: cyber security cybersecurity defense cybersecurity risk threats

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

A industry veteran, Thorsten Stremlau is Trusted Computing Group (TCG) Marketing Work Group Chair. TCG is a not-for-profit industry organization that develops and promotes industry standards to protect critical data and systems against cyberattacks,

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • data-center

    What the Zerologon vulnerability means for the state of enterprise security

    See More
  • utilities-sector-freepik

    66% of applications in the utilities sector have at least one exploitable security vulnerability per year

    See More
  • Emergency communications helps with business continuity and resiliency

    The impact of COVID-19 on emergency communications

    See More

Events

View AllSubmit An Event
  • September 3, 2024

    From DDoS Protection to WAAP: How Layered Protection Enhances Your Cybersecurity Strategy

    ON DEMAND: By participating in the webinar, attendees will gain enhanced knowledge of cyber threats and understand the current spectrum of cyber threats facing businesses.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!