By: Rajiv Pimplaskar
Modern enterprises are experiencing an invisible but critical infrastructure failure. Despite investments in cloud collaboration suites, contact center platforms, and advanced voice over IP
systems, network performance remains inconsistent. Teams meetings freeze, VoIP calls drop, and customer engagement tools falter at precisely the moments that matter most. These problems are rarely
due to the applications themselves. They stem from an outdated architectural assumption that enterprise communication can depend on a single, static network path in an inherently volatile internet
environment…
» read this article
By: Dan Carella
Today, mobile devices are where consumers bank, shop, work, socialize, and manage their most personal information. As a result, telecom providers find themselves in a unique position of digital
trust — and that responsibility is shifting in a critical way. While device- and network-level security has never been stronger, fraudsters are sidestepping these defenses to target the weakest
link: human behavior. This pivot in fraud strategy is one telecom leaders should monitor because it has the potential to have an outsized impact on consumer trust and loyalty…
» read this article
By: Martin Charbonneau
Communications service providers (CSPs) have played a leading role in digital transformation for decades. They have shepherded enterprises through massive technological shifts, from enabling
global connectivity to delivering services in the cloud. Now, the paradigm is shifting again, driven by the looming threat of quantum computing that will present entirely new challenges for
cybersecurity. The risks posed by quantum attacks are likely to affect every industry, making quantum defense an immediate national and economic imperative…
» read this article
By: Kevin Mayo, CISSP, PMP
The networks we rely on today face constant stress from demands that weren’t even on the horizon when these networks were designed several years (or decades) ago. From traffic spikes and
distributed workloads to malicious threats and AI-driven demands, large-scale network infrastructure must now be ready to adapt, scale, and respond to unpredictability in real-time. Network
assurance—making sure your network performs as intended in any condition—once meant ensuring uptime. In today’s world, the connections that power business operations depend on how well networks are
designed not only for uptime but also for resilience, scalability, and security as demands continue to change…
» read this article
By: David Primor
Cybersecurity conversations with small and midsize businesses (SMBs) often start with a review of the key topics such as internal defenses, antivirus, patching, firewalls, and employee
training. These are important, of course, but they only cover part of the picture. There is a quieter, harder-to-control vulnerability that is becoming one of the biggest threats to SMB resilience
- third-party risk. Vendors and service providers are now woven into almost every aspect of how SMBs operate. Whether it is outsourced IT, cloud applications, payroll, or digital marketing, these
external partners often hold sensitive data or have direct access to networks…
» read this article
By: Dmitry Sumin
National regulators, charged with consumer protection as well as national security objectives, are becoming more active in the fight against voice and SMS fraud. But legislation on its own has
limits. Operators deploy solutions ranging from number validation to advanced AI-based fraud detection, yet without cooperation across networks, even the most sophisticated tools cannot address the
central problem: spoofing. By promoting technical solutions at the national level, regulators can enable cooperation among operators, enterprises, and government agencies to safeguard the integrity
of voice and SMS traffic…
» read this article
By: Matt Rider
Security leaders face intensifying pressure from all angles. With attack volumes rising, AI-generated threats outpacing traditional defences, and analyst burnout on the rise, the cybersecurity
landscape is demanding more than conventional responses. But AI offers a unique strategic inflection point—particularly through agentic AI, which elevates the role of security tools from reactive
helpers to proactive partners. A recent PwC survey from May 2025 showed that 79% of senior executives report AI agents are already in use in their organisations, and 66% of those report
productivity gains…
» read this article
By: Jeff Hill
Telecommunications companies stand at an important crossroads. For more than a century, their role was clear: deliver reliable, secure connectivity to customers who trusted them implicitly. In
the last two decades, telcos have extended their reach into cloud, hosting, and managed IT services. Now, with cyberattacks dominating the headlines, enterprise and mid-market customers are
increasingly looking to these same providers for help protecting their data and operations.The opportunity is enormous…
» read this article
By: Mark Cummings, Ph.D.
GenAI, and intelligent agents using it, have the potential for significant productivity improvements. To achieve the full productivity benefits, we need to learn how to secure, develop, and
deploy these technologies. Currently, it appears that we are very low on the learning curve. As an industry, we are just beginning to understand the security vulnerabilities and the challenges of
developing effective applications of these technologies. The best way to quickly move up the learning curve and capture the full productivity benefits is to create a way that implementers can share
experience and develop best practices…
» read this article
By: Tony Martino
Telecoms fraud protection and prevention is a strategic imperative for Communication Service Providers (CSPs). It safeguards revenue, trust, and customer loyalty whilst providing opportunities
to differentiate in an increasingly competitive market. Fraud in telecoms is not a new problem, but the pace and complexity of threats has intensified. Fraudsters have adapted to the realities
of hybrid working, cloud-based communications, and the age of AI. What has not changed is the scale of the challenge: the Communications Fraud Control Association (CFCA) estimates that telecoms
fraud costs operators more than $38 billion USD annually in the US alone…
» read this article
By: Scott St. John - Pipeline
We live in an era where connectivity is no longer just an enabler — it’s the very backbone of business, society, and the global economy. Today’s enterprises and service providers are locked
into a relentless race: not only to connect — customers, devices, and networks — but to secure, assure, and trust those connections. Every mesh of cables, every wireless hop, every cloud-based
service is now a potential target and potential battleground. In the last decade, we have witnessed two competing forces…
» read this article
By: Pipeline Magazine
October’s Pipeline News Center delivered a torrent of announcements that confirmed the technology sector’s decisive pivot from reactive systems to proactive, self-governing ecosystems. Agentic
AI took center stage, with autonomous systems negotiating bandwidth, streamlining supply chains, and securing transactions, while optical networks hit 1.6 terabit speeds and quantum milestones
pointed toward a post-classical security future. Among the top newsmakers were Qualcomm, Oracle, Nokia, and Verizon, whose repeated appearances underscored a consolidation around AI-native
infrastructure stacks…
» read this article