By: Jim Ricotta
Experts estimate that quantum technology capable of breaking current encryption algorithms and intercepting communications will be possible no later than 2030. The day the first quantum
computer (or a network of quantum computers) is able to decrypt security schemes currently in-use is widely referred to as Q-Day, and due to the complexity of upgrading these systems, network
operators and other organizations need to be taking steps now to prepare for this looming threat to existing networks and communications encryption…
» read this article
By: Cathal Mc Daid
The 2022 Russian invasion of Ukraine has been ground-breaking in many ways when it comes to technology. One of the least acknowledged, but potentially most important development, has been the
wartime use of mobile telecom networks. Overlooked before the war, when most analysts (mistakenly) predicted that their version of “cyberwarfare” would play a large part in the conflict, military
and civilian use of mobile telecom networks has had a massive impact on the course of the conflict. Ukraine’s efforts to keep its communications infrastructure operational has paid dividends in
three different areas: One: Ukrainian morale and international response…
» read this article
By: Richard Kitney
SASE (Secure Access Service Edge, pronounced ‘Sassy’) is a term coined around four years ago. If you haven’t come across it yet, you probably will, because Gartner forecasts that the SASE
market will reach nearly $15 billion by 2025. SASE came about as a response to the rise in hybrid working and a dispersed workforce. It enables a corporate network to be deployed over the internet
and addresses the security issues that come with more applications sitting in the cloud, data stored in multiple cloud services, and users connecting from anywhere on any device…
» read this article
By: Koroush Saraf - VP Product Management, ZPE Systems
Ransomware attacks plague organizations with major disruptions and financial losses. Gartner has gone so far as to describe ransomware as the modern-day disaster, with a Sophos survey showing
that over 70% of affected organizations require more than two weeks to fully recover from an attack. Recent high-profile breaches on organizations like MGM and Caesars, as well as the thousands of
organizations using the MOVEit protocol, have underscored the resilience and adaptability of threats despite there being thousands of modern cybersecurity products in use…
» read this article
By: Xavier Salinas
In my 15-year career in the world of IT and cybersecurity, the attack surface used by hackers has continually grown while we have more and more to protect. Simply put, the more we innovate and
advance, the more ways “in” hackers have. While the cloud remains a prime target for hackers today, earlier in my career the focus was on targeting network perimeters, critical internet-facing
vulnerabilities, and endpoint devices. Now, the emerging attack surface is single sign-on (SSO). While SSO eases friction for its users, it also makes hackers’ lives easier…
» read this article
By: Sumit Chahaun
In an era where technology relentlessly pushes the boundaries of innovation, vehicles have evolved from mere modes of transportation into sophisticated data hubs on wheels. This transformation
is particularly evident in the case of connected vehicles, which seamlessly harness advanced technology to access, store, and transmit data via the Internet. While these advancements undoubtedly
enhance vehicle performance and security, they also give rise to a host of challenges, primarily concerning data security and safeguarding user privacy…
» read this article
By: Miguel Carames
From the onset, 5G technology created high expectations, spanning from improved energy efficiency to accommodating a high density of IoT devices. Moreover, it promises to provide substantially
higher data speeds and lower latencies compared to earlier generations. However, amid all these advancements, one element of 5G in particular has really stirred excitement: network slicing. This
technology offers an unprecedented level of flexibility in the way we design, manage, and utilize our networks. Advances such as this, however, often carry hidden elements of risk…
» read this article
By: Paul Baird
…
» read this article
By: Crystal Morin
Companies are committed to using cloud technologies in their operations. According to Gartner forecasts, spending on public cloud services will total nearly $600 billion in 2023. Enterprises
are spending because they want to engage with new technologies like AI, and because they have larger, ongoing digital transformation projects. Implementation in the cloud is also faster than
starting with a traditional data center, as companies can take advantage of the cloud’s scalability and speed of deployment…
» read this article
By: David Ellis
Over the past few years many businesses, government organizations, and schools have made a massive shift to cloud services. According to Gartner, by 2025, 85% of infrastructure strategies will
integrate on-premises, colocation, cloud, and edge delivery options, compared with 20% in 2020. The data center industry is therefore anticipating and preparing for an unprecedented growth of
operations and facilities. As demand for cloud services soars, regulations evolve, and cyber threats increase, data center professionals have a complicated new reality to navigate…
» read this article
By: Scott St. John - Pipeline
It’s a mad, mad world out there and it seems with each passing day it’s becoming even more of a battlefield. Our daily lives have become consumed with a barrage of communications, many of which
have been specifically and meticulously designed to trick us into inadvertently handing over our money, identity, or the very keys to our kingdom. Every minute of every day is chocked full of
phishing and ransomware emails, robocalls, fake social engagements, data breaches, web threats – and that’s not to mention the parade of headlines regarding the ground wars in Europe and the Middle
East, or the constant stream of saber rattling threatening global nuclear war…
» read this article
By: Thomas Board, Pipeline
As we move swiftly into the final months of 2023, tech and telco news is showing no signs of slowing down here at Pipeline. We’ve got exciting news from around the world firstly focusing on
this month’s issue theme of Security & Assurance. We’re also covering stories in IoT, market activity, artificial intelligence, and more. This month’s top industry news stories are summarized
below. To view current breaking news in real time, visit Pipeline’s News Center, follow Pipeline on social media, or subscribe to receive our weekly telecom industry news summary…
» read this article