Picture

Questions?

+1-866-353-3335

SEARCH
What are you looking for?
Need help finding what you are looking for? Contact Us
Compare

PUBLISHER: IDATE | PRODUCT CODE: 1567664

Cover Image

PUBLISHER: IDATE | PRODUCT CODE: 1567664

Cryptography in Telecommunications: Strengthening Cybersecurity

PUBLISHED:
PAGES: 51 Pages
DELIVERY TIME: 1-2 business days
SELECT AN OPTION
Web Access - PPT (Group License/All Users)
USD 5593.50

Add to Cart

Quantum computing poses a significant threat to cybersecurity primarily due to its potential to break widely used cryptographic algorithms. The aim of this study is to analyze the evolution of cyberthreat risks, particularly from the angle of telecoms companies and to highlight the crucial importance of strengthening their cybersecurity in this changing context.

It seeks to answer the following questions:

  • What is the impact and evolution of cybercrime?
  • Why is telco cybersecurity crucial in a digital society?
  • How are cyberthreats currently managed and mitigated?
  • How can the development of Quantum computing disrupt current cybersecurity?
  • What initiatives are governments and telcos taking in the race for Quantum computing?
  • What solutions are available to protect an organization in the Quantum era?
  • What is the market potential for Quantum-safe cryptography solutions?
Product Code: M00131

Table of Contents

Executive Summary

1. The Stake of Cybercrime

  • 1.1. Factors behind the increase in cyber-attacks

2. The Importance of Telcos Cybersecurity

  • 2.1. The importance of Telecommunications
  • 2.2. Telecommunications companies a high value target
  • 2.3. Importance of Telcos data security

3. Cryptography and Threat Mitigation

  • 3.1. Cryptography
  • 3.2. Main cybersecurity threats for Telecommunications
  • 3.3. Cyber threat mitigation strategies

4. Future Challenge in Cybersecurity

  • 4.1. Quantum computing development and associated risks
  • 4.2. Quantum computing impact on cryptography
  • 4.3. Preparing cybersecurity for the Quantum era is urgent
  • 4.4. Solution to build a post-Quantum secure system
  • 4.5. International initiatives related to the Quantum challenges

5. The Quantum Computing Race

  • 5.1. Quantum computing investment
  • 5.2 Industry players in Quantum Computing and related technologies
  • 5.3 National Quantum technology programs
  • 5.4 What about telcos?

6. Post-Quantum Solution Providers

  • 6.1. Hardware & Software Solution Providers
  • 6.2. SandboxAQ
  • 6.3. IBM
  • 6.4. ISARA

7. Market Sizing

  • 7.1 Revenues from Post-Quantum Cryptography

8. Recommendations for Telcos

  • 8.1. Steps to anticipate Quantum risk
Have a question?
Picture

Jeroen Van Heghe

Manager - EMEA

+32-2-535-7543

Picture

Christine Sirois

Manager - Americas

+1-860-674-8796

Questions? Please give us a call or visit the contact form.
Hi, how can we help?
Contact us!