PodcastsRank #26275
Artwork for Telecom Reseller

Telecom Reseller

Tech NewsPodcastsNewsTechnologyEN-USunited-statesBi-weekly
4.9 / 5
UC, UCaaS, Cloud, Collaboration, Mobility, Contact Center and Security. Join us as we report on the leading topics and brands in the UC field, including Avaya, Cisco, Microsoft Teams, AWS, Salesforce, and much more. TR podcasts are for enterprises, channel partners, MSPs and carriers. These podcasts bring you the people, products and partners who bring solutions to market.
Top 52.6% by pitch volume (Rank #26275 of 50,000)Data updated Feb 10, 2026

Key Facts

Publishes
Bi-weekly
Episodes
50
Founded
N/A
Category
Tech News
Number of listeners
Private
Hidden on public pages

Listen to this Podcast

Pitch this podcast
Get the guest pitch kit.
Book a quick demo to unlock the outreach details you actually need before you hit send.
  • Verified contact + outreach fields
  • Exact listener estimates (not just bands)
  • Reply rate + response timing signals
10 minutes. Friendly walkthrough. No pressure.
Book a demo
Public snapshot
Audience: 8K–20K / month
Canonical: https://podpitch.com/podcasts/telecom-reseller
Cadence: Active monthly
Reply rate: 35%+

Latest Episodes

Back to top

Entrust Warns Digital Trust Has a Deadline as Post-Quantum Threat Nears, Podcast

Fri Feb 06 2026

Listen

Doug Green, Publisher of Technology Reseller News, sat down with Samantha Mabey, Director of Digital Solutions Marketing at Entrust, to discuss new research revealing that most organizations remain unprepared for the coming post-quantum era—despite mounting evidence that the clock is ticking. The podcast, supported by slides, walks through findings from Entrust’s latest global study, 2026 Global State of Post-Quantum and Cryptographic Security Trends, and unpacks what they mean for MSPs, telecom providers, and enterprise security leaders. Mabey explained that Entrust focuses on identity-centric security, with cryptographic technologies—such as PKI, hardware security modules (HSMs), certificate management, and key lifecycle management—forming the backbone of modern digital infrastructure. These technologies underpin everything from secure web traffic and APIs to device identity, software updates, and machine-to-machine authentication. The challenge, she noted, is that today’s widely used public-key cryptography, including RSA and elliptic curve cryptography, will eventually be breakable by cryptographically relevant quantum computers. According to the research cited in the discussion, more than half of organizations believe quantum systems capable of breaking current encryption could arrive within five years, yet only 38 percent say they are actively transitioning toward post-quantum readiness. Mabey emphasized that the transition will be far more complex than previous cryptographic migrations, such as the long-running move from SHA-1 to SHA-2, because cryptography is embedded across nearly every system and workflow. The risks of inaction are significant. Mabey outlined three major areas of exposure: loss of data confidentiality as encrypted information becomes vulnerable in the future; erosion of trust and integrity if digital signatures can be forged; and operational disruption, since many organizations lack full visibility into where cryptography is deployed. The report found that fewer than half of organizations have complete visibility into their certificates and keys, even before factoring in post-quantum requirements. To become post-quantum ready, Mabey described a phased journey that begins with discovery and inventory—understanding where cryptography is used, who owns it, and how it is managed. From there, organizations must build crypto agility, enabling them to change algorithms without disrupting operations. This includes people, processes, centralized policy, and automation, not just technology. Only then can organizations safely introduce post-quantum cryptography, often through hybrid approaches that combine existing algorithms with quantum-safe methods. The conversation also highlighted the urgency created by emerging standards. Guidance from NIST indicates that traditional public-key cryptography is expected to be deprecated by 2030 and fully disallowed by 2035, timelines that are likely to be followed globally. For telecom providers in particular, Mabey noted that long-lived infrastructure, embedded systems, and constrained devices increase exposure to “harvest now, decrypt later” attacks, making phased migration and vendor alignment critical. As the discussion concluded, Mabey stressed that organizations making progress treat post-quantum readiness as a program, not a one-time project. Those moving forward are aligning teams, investing in visibility and automation, and working closely with vendors that have clear post-quantum roadmaps. Those falling behind, she warned, are underestimating the operational burden and waiting for a “perfect moment” that has already arrived. View the report at https://www.entrust.com/resources/reports/ponemon-post-quantum-report-2026 Visit https://www.entrust.com/

More

Doug Green, Publisher of Technology Reseller News, sat down with Samantha Mabey, Director of Digital Solutions Marketing at Entrust, to discuss new research revealing that most organizations remain unprepared for the coming post-quantum era—despite mounting evidence that the clock is ticking. The podcast, supported by slides, walks through findings from Entrust’s latest global study, 2026 Global State of Post-Quantum and Cryptographic Security Trends, and unpacks what they mean for MSPs, telecom providers, and enterprise security leaders. Mabey explained that Entrust focuses on identity-centric security, with cryptographic technologies—such as PKI, hardware security modules (HSMs), certificate management, and key lifecycle management—forming the backbone of modern digital infrastructure. These technologies underpin everything from secure web traffic and APIs to device identity, software updates, and machine-to-machine authentication. The challenge, she noted, is that today’s widely used public-key cryptography, including RSA and elliptic curve cryptography, will eventually be breakable by cryptographically relevant quantum computers. According to the research cited in the discussion, more than half of organizations believe quantum systems capable of breaking current encryption could arrive within five years, yet only 38 percent say they are actively transitioning toward post-quantum readiness. Mabey emphasized that the transition will be far more complex than previous cryptographic migrations, such as the long-running move from SHA-1 to SHA-2, because cryptography is embedded across nearly every system and workflow. The risks of inaction are significant. Mabey outlined three major areas of exposure: loss of data confidentiality as encrypted information becomes vulnerable in the future; erosion of trust and integrity if digital signatures can be forged; and operational disruption, since many organizations lack full visibility into where cryptography is deployed. The report found that fewer than half of organizations have complete visibility into their certificates and keys, even before factoring in post-quantum requirements. To become post-quantum ready, Mabey described a phased journey that begins with discovery and inventory—understanding where cryptography is used, who owns it, and how it is managed. From there, organizations must build crypto agility, enabling them to change algorithms without disrupting operations. This includes people, processes, centralized policy, and automation, not just technology. Only then can organizations safely introduce post-quantum cryptography, often through hybrid approaches that combine existing algorithms with quantum-safe methods. The conversation also highlighted the urgency created by emerging standards. Guidance from NIST indicates that traditional public-key cryptography is expected to be deprecated by 2030 and fully disallowed by 2035, timelines that are likely to be followed globally. For telecom providers in particular, Mabey noted that long-lived infrastructure, embedded systems, and constrained devices increase exposure to “harvest now, decrypt later” attacks, making phased migration and vendor alignment critical. As the discussion concluded, Mabey stressed that organizations making progress treat post-quantum readiness as a program, not a one-time project. Those moving forward are aligning teams, investing in visibility and automation, and working closely with vendors that have clear post-quantum roadmaps. Those falling behind, she warned, are underestimating the operational burden and waiting for a “perfect moment” that has already arrived. View the report at https://www.entrust.com/resources/reports/ponemon-post-quantum-report-2026 Visit https://www.entrust.com/

Key Metrics

Back to top
Pitches sent
13
From PodPitch users
Rank
#26275
Top 52.6% by pitch volume (Rank #26275 of 50,000)
Average rating
4.9
Ratings count may be unavailable
Reviews
1
Written reviews (when available)
Publish cadence
Bi-weekly
Active monthly
Episode count
50
Data updated
Feb 10, 2026
Social followers
N/A

Public Snapshot

Back to top
Country
United States
Language
EN-US
Language (ISO)
Release cadence
Bi-weekly
Latest episode date
Fri Feb 06 2026

Audience & Outreach (Public)

Back to top
Audience range
8K–20K / month
Public band
Reply rate band
35%+
Public band
Response time band
2–4 weeks
Public band
Replies received
21–50
Public band

Public ranges are rounded for privacy. Unlock the full report for exact values.

Presence & Signals

Back to top
Social followers
N/A
Contact available
Yes
Masked on public pages
Sponsors detected
No
Guest format
No

Social links

No public profiles listed.

Demo to Unlock Full Outreach Intelligence

We publicly share enough context for discovery. For actionable outreach data, unlock the private blocks below.

Audience & Growth
Demo to unlock
Monthly listeners49,360
Reply rate18.2%
Avg response4.1 days
See audience size and growth. Demo to unlock.
Contact preview
p***@hidden
Get verified host contact details. Demo to unlock.
Sponsor signals
Demo to unlock
Sponsor mentionsLikely
Ad-read historyAvailable
View sponsorship signals and ad read history. Demo to unlock.
Book a demo

How To Pitch Telecom Reseller

Back to top

Want to get booked on podcasts like this?

Become the guest your future customers already trust.

PodPitch helps you find shows, draft personalized pitches, and hit send faster. We share enough public context for discovery; for actionable outreach data, unlock the private blocks.

  • Identify shows that match your audience and offer.
  • Write pitches in your voice (nothing sends without you).
  • Move from “maybe later” to booked interviews faster.
  • Unlock deeper outreach intelligence with a quick demo.

This show is Rank #26275 by pitch volume, with 13 pitches sent by PodPitch users.

Book a demoBrowse more shows10 minutes. Friendly walkthrough. No pressure.
4.9 / 5
RatingsN/A
Written reviews1

We summarize public review counts here; full review text aggregation is not shown on PodPitch yet.

Frequently Asked Questions About Telecom Reseller

Back to top

What is Telecom Reseller about?

UC, UCaaS, Cloud, Collaboration, Mobility, Contact Center and Security. Join us as we report on the leading topics and brands in the UC field, including Avaya, Cisco, Microsoft Teams, AWS, Salesforce, and much more. TR podcasts are for enterprises, channel partners, MSPs and carriers. These podcasts bring you the people, products and partners who bring solutions to market.

How often does Telecom Reseller publish new episodes?

Bi-weekly

How many listeners does Telecom Reseller get?

PodPitch shows a public audience band (like "8K–20K / month"). Book a demo to unlock exact audience estimates and how we calculate them.

How can I pitch Telecom Reseller?

Use PodPitch to access verified outreach details and pitch recommendations for Telecom Reseller. Start at https://podpitch.com/try/1.

Which podcasts are similar to Telecom Reseller?

This page includes internal links to similar podcasts. You can also browse the full directory at https://podpitch.com/podcasts.

How do I contact Telecom Reseller?

Public pages only show a masked contact preview. Book a demo to unlock verified email and outreach fields.

Quick favor for your future self: want podcast bookings without the extra mental load? PodPitch helps you find shows, draft personalized pitches, and hit send faster.