Evolving The Network to Prepare for Q-Day

By: Jim Ricotta

Experts estimate that quantum technology capable of breaking current encryption algorithms and intercepting communications will be possible no later than 2030. The day the first quantum computer (or a network of quantum computers) is able to decrypt security schemes currently in-use is widely referred to as Q-Day, and due to the complexity of upgrading these systems, network operators and other organizations need to be taking steps now to prepare for this looming threat to existing networks and communications encryption…

» read this article

How Ukraine’s Telecom Infrastructure
Became Critical for its Defense

By: Cathal Mc Daid

The 2022 Russian invasion of Ukraine has been ground-breaking in many ways when it comes to technology. One of the least acknowledged, but potentially most important development, has been the wartime use of mobile telecom networks. Overlooked before the war, when most analysts (mistakenly) predicted that their version of “cyberwarfare” would play a large part in the conflict, military and civilian use of mobile telecom networks has had a massive impact on the course of the conflict. Ukraine’s efforts to keep its communications infrastructure operational has paid dividends in three different areas: One: Ukrainian morale and international response…

» read this article

Busting SASE Misconceptions

By: Richard Kitney

SASE (Secure Access Service Edge, pronounced ‘Sassy’) is a term coined around four years ago. If you haven’t come across it yet, you probably will, because Gartner forecasts that the SASE market will reach nearly $15 billion by 2025. SASE came about as a response to the rise in hybrid working and a dispersed workforce. It enables a corporate network to be deployed over the internet and addresses the security issues that come with more applications sitting in the cloud, data stored in multiple cloud services, and users connecting from anywhere on any device…

» read this article

Ransomware Defense: Cutting the Kill Chain

By: Koroush Saraf - VP Product Management, ZPE Systems

Ransomware attacks plague organizations with major disruptions and financial losses. Gartner has gone so far as to describe ransomware as the modern-day disaster, with a Sophos survey showing that over 70% of affected organizations require more than two weeks to fully recover from an attack. Recent high-profile breaches on organizations like MGM and Caesars, as well as the thousands of organizations using the MOVEit protocol, have underscored the resilience and adaptability of threats despite there being thousands of modern cybersecurity products in use…

» read this article

Hackers Unmasked:
How They Use Your Identity Against You

By: Xavier Salinas

In my 15-year career in the world of IT and cybersecurity, the attack surface used by hackers has continually grown while we have more and more to protect. Simply put, the more we innovate and advance, the more ways “in” hackers have. While the cloud remains a prime target for hackers today, earlier in my career the focus was on targeting network perimeters, critical internet-facing vulnerabilities, and endpoint devices. Now, the emerging attack surface is single sign-on (SSO). While SSO eases friction for its users, it also makes hackers’ lives easier…

» read this article

Balancing Data Privacy and Cybersecurity
in Modern Connected Vehicles

By: Sumit Chahaun

In an era where technology relentlessly pushes the boundaries of innovation, vehicles have evolved from mere modes of transportation into sophisticated data hubs on wheels. This transformation is particularly evident in the case of connected vehicles, which seamlessly harness advanced technology to access, store, and transmit data via the Internet. While these advancements undoubtedly enhance vehicle performance and security, they also give rise to a host of challenges, primarily concerning data security and safeguarding user privacy…

» read this article

Six 5G Security Threats to Prepare For

By: Miguel Carames

From the onset, 5G technology created high expectations, spanning from improved energy efficiency to accommodating a high density of IoT devices. Moreover, it promises to provide substantially higher data speeds and lower latencies compared to earlier generations. However, amid all these advancements, one element of 5G in particular has really stirred excitement: network slicing. This technology offers an unprecedented level of flexibility in the way we design, manage, and utilize our networks. Advances such as this, however, often carry hidden elements of risk…

» read this article

Building Your Risk Management and Security Strategy

By: Paul Baird

» read this article

Cloud, Cybersecurity, and the Role for CNAPP

By: Crystal Morin

Companies are committed to using cloud technologies in their operations. According to Gartner forecasts, spending on public cloud services will total nearly $600 billion in 2023. Enterprises are spending because they want to engage with new technologies like AI, and because they have larger, ongoing digital transformation projects. Implementation in the cloud is also faster than starting with a traditional data center, as companies can take advantage of the cloud’s scalability and speed of deployment…

» read this article

Modernize Physical Access Control
to Close Data Center Cybersecurity Gaps

By: David Ellis

Over the past few years many businesses, government organizations, and schools have made a massive shift to cloud services. According to Gartner, by 2025, 85% of infrastructure strategies will integrate on-premises, colocation, cloud, and edge delivery options, compared with 20% in 2020. The data center industry is therefore anticipating and preparing for an unprecedented growth of operations and facilities. As demand for cloud services soars, regulations evolve, and cyber threats increase, data center professionals have a complicated new reality to navigate…

» read this article

Letter from the Editor

By: Scott St. John, Pipeline

It’s a mad, mad world out there and it seems with each passing day it’s becoming even more of a battlefield. Our daily lives have become consumed with a barrage of communications, many of which have been specifically and meticulously designed to trick us into inadvertently handing over our money, identity, or the very keys to our kingdom. Every minute of every day is chocked full of phishing and ransomware emails, robocalls, fake social engagements, data breaches, web threats – and that’s not to mention the parade of headlines regarding the ground wars in Europe and the Middle East, or the constant stream of saber rattling threatening global nuclear war…

» read this article

IT & Telecom Industry News

By: Thomas Board, Pipeline

As we move swiftly into the final months of 2023, tech and telco news is showing no signs of slowing down here at Pipeline. We’ve got exciting news from around the world firstly focusing on this month’s issue theme of Security & Assurance. We’re also covering stories in IoT, market activity, artificial intelligence, and more. This month’s top industry news stories are summarized below. To view current breaking news in real time, visit Pipeline’s News Center, follow Pipeline on social media, or subscribe to receive our weekly telecom industry news summary…

» read this article

Latest Updates

Subscribe to our YouTube Channel