SUBSCRIBE NOW
IN THIS ISSUE
PIPELINE RESOURCES

Rethinking Network Architecture for
the Era of Real-Time Collaboration

By: Rajiv Pimplaskar

Modern enterprises are experiencing an invisible but critical infrastructure failure. Despite investments in cloud collaboration suites, contact center platforms, and advanced voice over IP systems, network performance remains inconsistent. Teams meetings freeze, VoIP calls drop, and customer engagement tools falter at precisely the moments that matter most. These problems are rarely due to the applications themselves. They stem from an outdated architectural assumption that enterprise communication can depend on a single, static network path in an inherently volatile internet environment…

» read this article

Always On Means
Mobile Customers Are Always At Risk

By: Dan Carella

Today, mobile devices are where consumers bank, shop, work, socialize, and manage their most personal information. As a result, telecom providers find themselves in a unique position of digital trust — and that responsibility is shifting in a critical way. While device- and network-level security has never been stronger, fraudsters are sidestepping these defenses to target the weakest link: human behavior. This pivot in fraud strategy is one telecom leaders should monitor because it has the potential to have an outsized impact on consumer trust and loyalty…

» read this article

Why Security Agility and Resilience
Are Critical in the Quantum Era

By: Martin Charbonneau

Communications service providers (CSPs) have played a leading role in digital transformation for decades. They have shepherded enterprises through massive technological shifts, from enabling global connectivity to delivering services in the cloud. Now, the paradigm is shifting again, driven by the looming threat of quantum computing that will present entirely new challenges for cybersecurity. The risks posed by quantum attacks are likely to affect every industry, making quantum defense an immediate national and economic imperative…

» read this article

Designing Resilient Networks That Refuse to Fail

By: Kevin Mayo, CISSP, PMP

The networks we rely on today face constant stress from demands that weren’t even on the horizon when these networks were designed several years (or decades) ago. From traffic spikes and distributed workloads to malicious threats and AI-driven demands, large-scale network infrastructure must now be ready to adapt, scale, and respond to unpredictability in real-time. Network assurance—making sure your network performs as intended in any condition—once meant ensuring uptime. In today’s world, the connections that power business operations depend on how well networks are designed not only for uptime but also for resilience, scalability, and security as demands continue to change…

» read this article

Third-Party Risk: The Hidden
Cybersecurity Weakness for SMBs

By: David Primor

Cybersecurity conversations with small and midsize businesses (SMBs) often start with a review of the key topics such as internal defenses, antivirus, patching, firewalls, and employee training. These are important, of course, but they only cover part of the picture. There is a quieter, harder-to-control vulnerability that is becoming one of the biggest threats to SMB resilience - third-party risk. Vendors and service providers are now woven into almost every aspect of how SMBs operate. Whether it is outsourced IT, cloud applications, payroll, or digital marketing, these external partners often hold sensitive data or have direct access to networks…

» read this article

Why a National Platform is Necessary to
Protect Communication Channels from Fraud

By: Dmitry Sumin

National regulators, charged with consumer protection as well as national security objectives, are becoming more active in the fight against voice and SMS fraud. But legislation on its own has limits. Operators deploy solutions ranging from number validation to advanced AI-based fraud detection, yet without cooperation across networks, even the most sophisticated tools cannot address the central problem: spoofing. By promoting technical solutions at the national level, regulators can enable cooperation among operators, enterprises, and government agencies to safeguard the integrity of voice and SMS traffic…

» read this article

Closing Critical Cybersecurity Gaps: How
Agentic AI is Reshaping CISOs' Strategy

By: Matt Rider

Security leaders face intensifying pressure from all angles. With attack volumes rising, AI-generated threats outpacing traditional defences, and analyst burnout on the rise, the cybersecurity landscape is demanding more than conventional responses. But AI offers a unique strategic inflection point—particularly through agentic AI, which elevates the role of security tools from reactive helpers to proactive partners. A recent PwC survey from May 2025 showed that 79% of senior executives report AI agents are already in use in their organisations, and 66% of those report productivity gains…

» read this article

Crawling, Walking, Running: How Telcos Can
Safely Expand into Cybersecurity Services

By: Jeff Hill

Telecommunications companies stand at an important crossroads. For more than a century, their role was clear: deliver reliable, secure connectivity to customers who trusted them implicitly. In the last two decades, telcos have extended their reach into cloud, hosting, and managed IT services. Now, with cyberattacks dominating the headlines, enterprise and mid-market customers are increasingly looking to these same providers for help protecting their data and operations.The opportunity is enormous…

» read this article

AI Security and Assurance: Achieving
the AI Intelligent Agent Promise

By: Mark Cummings, Ph.D.

GenAI, and intelligent agents using it, have the potential for significant productivity improvements. To achieve the full productivity benefits, we need to learn how to secure, develop, and deploy these technologies. Currently, it appears that we are very low on the learning curve. As an industry, we are just beginning to understand the security vulnerabilities and the challenges of developing effective applications of these technologies. The best way to quickly move up the learning curve and capture the full productivity benefits is to create a way that implementers can share experience and develop best practices…

» read this article

Turning Toll Fraud and Scam Protection
into a Competitive Advantage

By: Tony Martino

Telecoms fraud protection and prevention is a strategic imperative for Communication Service Providers (CSPs). It safeguards revenue, trust, and customer loyalty whilst providing opportunities to differentiate in an increasingly competitive market. Fraud in telecoms is not a new problem, but the pace and complexity of threats has intensified. Fraudsters have adapted to the realities of hybrid working, cloud-based communications, and the age of AI. What has not changed is the scale of the challenge: the Communications Fraud Control Association (CFCA) estimates that telecoms fraud costs operators more than $38 billion USD annually in the US alone…

» read this article

Letter from the Editor
Security & Assuarnce - November 2025

By: Scott St. John - Pipeline

We live in an era where connectivity is no longer just an enabler — it’s the very backbone of business, society, and the global economy. Today’s enterprises and service providers are locked into a relentless race: not only to connect — customers, devices, and networks — but to secure, assure, and trust those connections. Every mesh of cables, every wireless hop, every cloud-based service is now a potential target and potential battleground. In the last decade, we have witnessed two competing forces…

» read this article

Telecom & IT Technology Industry News
Agents, Optics, and the Quantum Edge

By: Pipeline Magazine

October’s Pipeline News Center delivered a torrent of announcements that confirmed the technology sector’s decisive pivot from reactive systems to proactive, self-governing ecosystems. Agentic AI took center stage, with autonomous systems negotiating bandwidth, streamlining supply chains, and securing transactions, while optical networks hit 1.6 terabit speeds and quantum milestones pointed toward a post-classical security future. Among the top newsmakers were Qualcomm, Oracle, Nokia, and Verizon, whose repeated appearances underscored a consolidation around AI-native infrastructure stacks…

» read this article
FEATURED SPONSOR:

Latest Updates





Subscribe to our YouTube Channel