DSALTA Blog

How Secure Are the World's Top 100 Telecom Providers in 2025?

Written by

Ogulcan Ozdemir

|

Product Marketing Manager

Published on

Dec 11, 2025

Table of Contents

Why We Created This Report

Global telecom infrastructure supports almost every part of modern life. It carries the world's data, enables critical services, and connects billions of people and devices. The sector's cybersecurity posture directly impacts economic stability and public safety.

DSALTA published the 2025 Telecom Risk Assessment Report to answer a simple question: How resilient are the largest telecom providers when viewed through an objective, data-driven lens?

Our team analyzed the Top 100 telecom operators across 12 global regions. This group represents nearly $2 trillion in combined annual revenue and includes integrated operators, mobile carriers, cable and broadband ISPs, tower companies, and specialized communication providers.

The goal of the report is to highlight clear patterns in external security posture, vendor exposure, domain maturity, and infrastructure risk. It gives decision-makers a way to compare themselves against global peers and to understand where the industry is heading.

What You'll Learn in This Report

The Global Telecom Security Landscape

Telecom providers operate on different scales and with very different architectures. This leads to a wide range of security outcomes.

The highest performers score in the low-to-mid 800s. Others fall into the mid-400s. These differences reflect architectural discipline, vendor control, and modernization efforts more than company size or revenue.

Broadband and cable ISPs tend to show more consistent security maturity than mobile operators or large integrated carriers. In many cases, simpler infrastructure leads to fewer inherited risks.

Vendor Risk: The Sector's Most Persistent Challenge

One theme stands out across all 100 telecoms we analyzed. Vendor-managed infrastructure creates concentrated and recurring exposure. The report includes several examples:

  • 87% of telecoms have high-severity CMS vulnerabilities tied to external platforms

  • 60% of exposed remote access services are frequently targeted by ransomware groups

  • 35% have at least one critical database port exposed through third-party infrastructure or inherited configurations

  • 90% show SSL and TLS weaknesses on services not directly operated by internal teams


These findings illustrate a pattern seen across many regions. Telecom providers are improving internal controls, yet they continue to inherit risk from vendors, cloud providers, and legacy outsourced infrastructure.

Learn more about managing vendor risk at scale and implementing continuous monitoring for third-party exposure.

Who Manages Vendor Exposure Well

Some telecoms demonstrate strong control over third-party environments. These providers maintain unified governance, limit public exposure, and enforce consistent baseline standards.

 Lowest Vendor-Risk Telecoms

  1. Comcast

  2. China Mobile

  3. Taiwan Mobile

  4. China Communication Services

  5. Liberty Broadband

These companies show that vendor complexity can be managed when security ownership and architecture are aligned.

Where Vendor Risk Creates the Most Pressure

At the opposite end of the spectrum, several telecoms struggle with older environments, multiple outsourced systems, and fragmented vendor ecosystems.

Highest Vendor-Risk Telecoms

  1. Singtel

  2. Telefónica

  3. Lumen Technologies

  4. Vodafone

  5. Indosat

Their challenges often stem from inherited systems, regional expansion, and legacy outsourced infrastructure that were never modernized.

Segment Insights: Infrastructure Type Shapes Risk

 The report breaks down security outcomes across four telecom categories.

Integrated Operators

  • Broad portfolios and diverse infrastructure create uneven performance

  • Top performers: China Mobile, Taiwan Mobile, KT Corporation

Broadband and Cable ISPs

  • More consistent maturity due to stable networks

  • Top performers: Comcast, Liberty Broadband, Charter Communications

Mobile Operators

  • Higher exposure density and fragmented vendor relationships

  • Top performers: Vodafone Idea, Ooredoo, XLSmart

Specialty Communication Providers

  • Tower companies and backbone providers show strong discipline in focused domains

  • Top performers: China Communication Services, China Tower, T-Gaia Corporation

Why This Matters

Telecoms are not ordinary enterprises. They sit at the center of national communication networks and global digital infrastructure. A weakness in this layer can cascade across entire industries.

This year's report reinforces a clear point: Vendor ecosystems now shape telecom security posture as much as internal practices. As connectivity expands and third-party services become more embedded, transparency and measurable risk management become essential.

The RAR offers an evidence-based foundation for understanding where risk is concentrated and where leaders are pulling ahead.

Explore how DSALTA helps organizations automate vendor risk assessments and maintain continuous compliance across complex third-party ecosystems.

Access the Full Report

The complete 2025 Telecom RAR includes:

  • The full Top 100 RAS ranking

  • Detailed segment-level analysis

  • Ten-domain performance scoring

  • Regional and country-level summaries

  • Vendor exposure insights and parent-subsidiary comparisons

  • Actionable guidance for modernization and risk reduction

Download the 2025 Telecom Risk Assessment Report or contact research@dsalta.com for deeper analysis or enterprise-specific insights.