SUBSCRIBE NOW
IN THIS ISSUE
PIPELINE RESOURCES

Cyber Attacks are Rampant: Here’s
What ISPs Can Do to Stop Them

By: Jason Malmquist

Cyberattacks are increasingly more sophisticated and frequent, and they are posing significant threats to Internet Service Providers (ISPs). The critical infrastructure managed by ISPs makes them prime targets for cybercriminals seeking to disrupt services, steal sensitive data, or extort money through ransomware attacks. In the first six months of 2023 alone, $449.1 million was paid to ransomware groups. The bottom line is that cyberattacks are having a profound impact on business. Unfortunately, regional telcos and ISPs often have limited resources or the requisite IT staff to combat this scourge, and cybercriminals know it, which explains why they attack the low hanging fruit easily…

» read this article

Using AI to Minimize Outages on
High-Throughput Satellite (HTS) Networks

By: John Yates

It is well documented that the satcom industry is undergoing a major transformation. The technology is becoming accessible to all and is increasingly being adopted by fresh industries and new customers. As reliable communication systems have become widely available, more data is being shared than ever before. In light of this, High Throughput Satellites (HTS) are an increasingly popular choice for satellite operators because they deliver more than twenty times the data capacity of traditional satellites at a fraction of the cost per bit…

» read this article

Shifting the Balance: Rethinking Cybersecurity
in the Age of AI and Quantum Computing

By: Mark Pohto - CTO, Dispersive Holdings Inc.

The quickly accelerating pace of technological advancement brings both unparalleled opportunities and unprecedented threats. Emerging technologies like generative AI and quantum computing have the potential to revolutionize industries, but they also present grave challenges for cybersecurity. In this digital landscape, where threats evolve faster than many defenses can keep up, traditional passive approaches are no longer enough. Organizations must adopt a proactive, multi-layered defense strategy to address new threats head-on, leveraging cutting-edge innovations like Automated Moving Target Defense (AMTD) and Active Cyber Defense (ACD)…

» read this article

SATCOM + 5G: Resilient Communications
Services to Save Lives in Disaster Zones

By: Anil Rao

Terrestrial networks are often destroyed or severely damaged during natural disasters, or the disaster location is so remote that the connectivity simply doesn’t exist in the neighborhood. Consequently, the first responders and rescue agencies that put boots on the ground are severely restricted in their ability to perform their duties and save lives. In such situations, SATCOM has been the preferred choice for critical comms but has traditionally required expensive specialist equipment with limited features, making it prohibitive for widespread use…

» read this article

Navigating CSPs Migration Strategy in Digital Transformation Assurance

By: Chandra Sekhar Kondapi

According to International Data Corporation (IDC), the global expenditure on Digital Transformation is projected to soar to almost $3.9 trillion by 2027 growing at a Compound Annual Growth Rate (CAGR) of 16.1 percent. Among the industries driving this transformative surge, Financial Services and Telecom/Media sectors are poised to emerge as the most dynamic. These sectors are expected to elevate their Digital Transformation investments by over 20 percent throughout the forecast period. Traditionally, CSP operations stand apart from other industries due to the intrinsic role of technology not merely as a support function but as the cornerstone of their business model…

» read this article

The ABCs of CMMC: Clarifying
CMMC Certification

By: Scott Singer - CEO, CyberNINES

Navigating the requirements for Cybersecurity Maturity Model Certification (CMMC), not to mention the various players involved, can seem overwhelming to organizations relying on Department of Defense (DoD) contracts as a mainstay of their business, especially considering the risk of losing that business if not compliant. This article provides an overview of CMMC, the partners and providers you will work with as you become compliant, and important considerations when engaging these providers. The CMMC Program and The Cyber AB A good place to start is with the Cybersecurity Maturity Model Certification (CMMC) itself…

» read this article

Preventing Social Engineering Attacks

By: Karl Falk

Social engineering attacks are a very serious problem that GenAI is turbocharging. Existing solutions focusing on training and procedures are helpful but insufficient. Organizations need automated social engineering defensive tools. Existing large vendors lack the technology, expertise and economic incentives to provide these fully adequate solutions. The best way to get them is for large organizations to partner with innovators, thereby speeding up the process of bringing these solutions online…

» read this article

What Will Shape the Future of Non-Terrestrial
Networks and Global IoT?

By: Avnish Chauhan

The rise of Non-Terrestrial Networks and the acceleration of IoT are a $58 billion opportunity that is knocking on CSPs’ doorsteps. However, to seize this opportunity, operators need to understand the underlying trends molding these markets and to start addressing some critical questions. Trend 1: The Rise of NTNs Non-Terrestrial Networks (NTNs) will soon become an integral part of the future connectivity fabric. Juniper Research projects that the number of satellites is expected to grow 150 percent over the next five years, from 10,000 in 2024 to over 24,000 by 2029…

» read this article

The Role of Community in AI Safety: How
Open Source Projects Are Leading the Way

By: Huzaifa Sidhpurwala

Artificial intelligence (AI) is transforming industries at a rapid pace, bringing opportunities to optimize operations, enhance customer experience, and drive innovation. However, as AI becomes more deeply embedded in critical processes across sectors, concerns around its safety, ethics, and fairness have become more pronounced. Addressing these challenges requires more than technological advancements or regulatory frameworks; it calls for a proactive approach that places community engagement at the forefront of AI stewardship…

» read this article

Why the Future of Automotive Data Privacy Mirrors the Stringent Measures in Finance and Healthcare

By: Karl Falk

As data breaches and cyber threats become more prevalent than ever in the automotive industry, the importance of data privacy and the sense of urgency of implementing solutions cannot be overstated. Industries like finance and healthcare have long understood the critical need to safeguard sensitive information, and they have established strict guidelines, laws, and mandates to protect consumer data. The automotive industry, however, is only beginning to catch up. Despite the introduction of new laws and mandates, such as the Safeguards Rule under the Gramm-Leach-Bliley Act, there remains a significant gap in how automotive dealers perceive and implement data privacy measures…

» read this article

Letter from the Editor - November 2024

By: Scott St. John - Pipeline

What was once the subject of science fiction is now becoming top of mind for business leaders. Some threats are here today, and others are just over the horizon. Artificial Intelligence (AI) is being used, right now, to target your business. Medical devices are being programmed remotely, “over the air” and are vulnerable to attack. Quantum computers are being designed to crack encryption to gain access to trade, and national security, secrets. Concern is certainly warranted. The Future of Life Institute went so far as to posit modern advancements "create risks of catastrophe on a global scale…

» read this article

IT & Telecom Industry News

By: Thomas Board - Pipeline

2024 is nearing its close and companies are already planning development and marketing strategies for next year, but that hasn't slowed down the rate of tech related news. At Pipeline we have curated the most captivating stories from electoral cybersecurity to quantum innovations.As we enter Q4, tech companies around the world are fighting for first place to share the most innovative stories before the end of the year. At Pipeline we have sourced the most exciting stories ranging from surprising acquisitions to revolutionary moves in AI…

» read this article
FEATURED SPONSOR:

Latest Updates





Subscribe to our YouTube Channel