By: Jason Malmquist
Cyberattacks are increasingly more sophisticated and frequent, and they are posing significant threats to Internet Service Providers (ISPs). The critical infrastructure managed by ISPs makes
them prime targets for cybercriminals seeking to disrupt services, steal sensitive data, or extort money through ransomware attacks. In the first six months of 2023 alone, $449.1 million was paid
to ransomware groups. The bottom line is that cyberattacks are having a profound impact on business. Unfortunately, regional telcos and ISPs often have limited resources or the requisite IT staff
to combat this scourge, and cybercriminals know it, which explains why they attack the low hanging fruit easily…
» read this article
By: John Yates
It is well documented that the satcom industry is undergoing a major transformation. The technology is becoming accessible to all and is increasingly being adopted by fresh industries and new
customers. As reliable communication systems have become widely available, more data is being shared than ever before. In light of this, High Throughput Satellites (HTS) are an increasingly popular
choice for satellite operators because they deliver more than twenty times the data capacity of traditional satellites at a fraction of the cost per bit…
» read this article
By: Mark Pohto - CTO, Dispersive Holdings Inc.
The quickly accelerating pace of technological advancement brings both unparalleled opportunities and unprecedented threats. Emerging technologies like generative AI and quantum computing have
the potential to revolutionize industries, but they also present grave challenges for cybersecurity. In this digital landscape, where threats evolve faster than many defenses can keep up,
traditional passive approaches are no longer enough. Organizations must adopt a proactive, multi-layered defense strategy to address new threats head-on, leveraging cutting-edge innovations like
Automated Moving Target Defense (AMTD) and Active Cyber Defense (ACD)…
» read this article
By: Anil Rao
Terrestrial networks are often destroyed or severely damaged during natural disasters, or the disaster location is so remote that the connectivity simply doesn’t exist in the neighborhood.
Consequently, the first responders and rescue agencies that put boots on the ground are severely restricted in their ability to perform their duties and save lives. In such situations, SATCOM has
been the preferred choice for critical comms but has traditionally required expensive specialist equipment with limited features, making it prohibitive for widespread use…
» read this article
By: Chandra Sekhar Kondapi
According to International Data Corporation (IDC), the global expenditure on Digital Transformation is projected to soar to almost $3.9 trillion by 2027 growing at a Compound Annual Growth Rate
(CAGR) of 16.1 percent. Among the industries driving this transformative surge, Financial Services and Telecom/Media sectors are poised to emerge as the most dynamic. These sectors are expected to
elevate their Digital Transformation investments by over 20 percent throughout the forecast period. Traditionally, CSP operations stand apart from other industries due to the intrinsic role of
technology not merely as a support function but as the cornerstone of their business model…
» read this article
By: Scott Singer - CEO, CyberNINES
Navigating the requirements for Cybersecurity Maturity Model Certification (CMMC), not to mention the various players involved, can seem overwhelming to organizations relying on Department of
Defense (DoD) contracts as a mainstay of their business, especially considering the risk of losing that business if not compliant. This article provides an overview of CMMC, the partners and
providers you will work with as you become compliant, and important considerations when engaging these providers. The CMMC Program and The Cyber AB A good place to start is with the Cybersecurity
Maturity Model Certification (CMMC) itself…
» read this article
By: Mark Cummings, Ph.D.
Social engineering attacks are a very serious problem that GenAI is turbocharging. Existing solutions focusing on training and procedures are helpful but insufficient. Organizations need
automated social engineering defensive tools. Existing large vendors lack the technology, expertise and economic incentives to provide these fully adequate solutions. The best way to get them is
for large organizations to partner with innovators, thereby speeding up the process of bringing these solutions online…
» read this article
By: Miguel Carames
The rise of Non-Terrestrial Networks and the acceleration of IoT are a $58 billion opportunity that is knocking on CSPs’ doorsteps. However, to seize this opportunity, operators need to
understand the underlying trends molding these markets and to start addressing some critical questions. Trend 1: The Rise of NTNs Non-Terrestrial Networks (NTNs) will soon become an integral part
of the future connectivity fabric. Juniper Research projects that the number of satellites is expected to grow 150 percent over the next five years, from 10,000 in 2024 to over 24,000 by
2029…
» read this article
By: Huzaifa Sidhpurwala
Artificial intelligence (AI) is transforming industries at a rapid pace, bringing opportunities to optimize operations, enhance customer experience, and drive innovation. However, as AI becomes
more deeply embedded in critical processes across sectors, concerns around its safety, ethics, and fairness have become more pronounced. Addressing these challenges requires more than technological
advancements or regulatory frameworks; it calls for a proactive approach that places community engagement at the forefront of AI stewardship…
» read this article
By: Karl Falk
As data breaches and cyber threats become more prevalent than ever in the automotive industry, the importance of data privacy and the sense of urgency of implementing solutions cannot be
overstated. Industries like finance and healthcare have long understood the critical need to safeguard sensitive information, and they have established strict guidelines, laws, and mandates to
protect consumer data. The automotive industry, however, is only beginning to catch up. Despite the introduction of new laws and mandates, such as the Safeguards Rule under the Gramm-Leach-Bliley
Act, there remains a significant gap in how automotive dealers perceive and implement data privacy measures…
» read this article
By: Scott St. John - Pipeline
What was once the subject of science fiction is now becoming top of mind for business leaders. Some threats are here today, and others are just over the horizon. Artificial Intelligence
(AI) is being used, right now, to target your business. Medical devices are being programmed remotely, “over the air” and are vulnerable to attack. Quantum computers are being designed to
crack encryption to gain access to trade, and national security, secrets. Concern is certainly warranted. The Future of Life Institute went so far as to posit modern advancements "create risks
of catastrophe on a global scale…
» read this article
By: Thomas Board - Pipeline
2024 is nearing its close and companies are already planning development and marketing strategies for next year, but that hasn't slowed down the rate of tech related news. At Pipeline we
have curated the most captivating stories from electoral cybersecurity to quantum innovations.As we enter Q4, tech companies around the world are fighting for first place to share the most
innovative stories before the end of the year. At Pipeline we have sourced the most exciting stories ranging from surprising acquisitions to revolutionary moves in AI…
» read this article