Back To Top

Recent reports show the global edge computing market is expected to surpass $260 billion in 2025, driven by real-time analytics, low-latency processing and industry-specific workloads.
As businesses shift from centralised cloud to distributed edge scenarios, the new frontier isn’t simply “cloud minus distance”, it’s AI-powered edge nodes that make decisions locally and act independently when connectivity is disrupted.
The European Union’s IRIS² (Infrastructure for Resilience, Interconnectivity and Security by Satellite) program is gaining momentum. The concession contract has been awarded to the SpaceRISE consortium to build a multi-orbit constellation of ~290 satellites, aiming to deliver secure connectivity for government and commercial users.
The constellation will support global broadband connectivity, particularly in underserved regions. Recently, Kuiper signed an MoU with Uzbekistan to expand connectivity in Central Asia.
In 2025, Amazon accelerated deployment of its Project Kuiper network. The first 27 production satellites launched in April, part of a plan to field over 3,200 satellites eventually.
Amazon secured approval in Ireland for a satellite earth station gateway at the National Space Centre, boosting its European infrastructure footprint.
Forescout revealed that a hacktivist group known as TwoNet targeted a simulated water treatment plant (honeypot) in September 2025. The attackers breached human-machine interface (HMI) layers, manipulated processes, and attempted evasion of detection, underscoring vulnerabilities in Operational Technology (OT) systems.
Network Innovations has completed its acquisition of Infosat Communications (U.S. and Canada arms), consolidating capabilities in satellite operations, terrestrial networks, and connectivity services. This signals consolidation in the comms/infrastructure sector.
Researchers at the University of Portsmouth have proposed a new architecture, FedLLMGuard, aimed at strengthening security for 5G communications. The framework introduces protections around device-to-network interactions to counter data leakage and interception threats.