Hosted Payload S2.E1: Caroline Van Wie/Working Girl
Hosted Payload Episode 12: Mike Carlson / Spaceman
Hosted Payload Episode 11: Erin Boone/Interstellar
A Deep Dive Into Broadband Equity, Access, and Deployment With Scott D. Woods — TAG Infrastructure Talks Podcast
Hosted Payload Episode 10: Jeanine Poltronieri/For All Mankind (Season 1)
Hosted Payload Episode 7: Wiley All-Stars / Starship Troopers
Hosted Payload Episode 6
[Podcast] Hosted Payload Episode 4
[Podcast] Hosted Payload Episode 3
The Business and Legal Case for EMCs and Broadband - TAG Infrastructure Talks Podcast
Investigative Power: Utilizing Self Service Solutions for Internal Investigations?
[Podcast] Broadband and Beyond: A Conversation with NTIA Administrator Alan Davidson
Corruption, Crime, and Compliance - A Deep Dive into KT Corp's SEC Settlement for FCPA Violations
Cybersecurity and 889 Compliance in 2021: What Government Contractors Need to Know
CF on Cyber: An Update on the Florida Security of Communications Act (FSCA)
Investing in Colombia: Infrastructure Trends and 5G Concessions
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Telecommunication Consumer Protection Act (TCPA): Update and Practical Guidance
Navigating Section 889 of the 2019 National Defense Authorization Act
Does Cellular 5G Equal 5x the Fraud and Misconduct Risk?
The Promise of Connectivity: A Conversation with USTelecom President & CEO Jonathan Spalter
Editor’s Note: During a recent HaystackID webcast, expert panelists explored the role of the Committee on Foreign Investment in the United States (CFIUS) in protecting sensitive technologies, classified contracts, and other...more
The FCC has significantly expanded telecommunications carriers’ data breach notification and reporting obligations. Telecommunications carriers, including Voice over Internet Protocol (VoIP) services, and telecommunications...more
There has been a flurry of reporting in the past few days on the T-Mobile customer data compromise, with allegations that the compromise affected up to 100 million customers. ...more
Mint Mobile notified a “small number” of customers last weekend that their personal information was compromised between June 8 and June 10, when a threat actor ported the phone numbers of those customers to another carrier...more
Verizon's Protected Health Information Data Breach Report Concludes that Insiders Are Greatest Threat to Health Care Entities - Verizon recently issued its Protected Health Information Data Breach Report, which is always...more
New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more
On April 3, 2017, President Trump signed into law a rare Joint Resolution of Congress under the Congressional Review Act (“CRA”), which disapproved the Broadband Privacy Rules adopted late last year by then-Chairman Wheeler’s...more
On 11 April 2017 the Cyberspace Administration of China published a circular calling for comments on its draft Security Assessment for Personal Information and Important Data Transmitted Outside of the People’s Republic of...more
Yahoo’s troubles for failing to timely disclose security breaches provides rare insight into quantifying the financial and other costs to a company’s shareholders and leadership when a security breach occurs and is...more
In the span of two days, mobile device users learned of two data breaches that could compromise their personal data. In one, Experian (a credit reporting agency) reported that it was hacked, potentially putting 15 million...more
On July 6, 2015, China’s legislature, the National People’s Congress (NPC), circulated for comment two pieces of draft legislation with significant potential implications for data privacy and data security in China. Comments...more
Aiming to “address the real privacy and security risks that consumers face when telecommunications carriers use their control of customers’ mobile devices to collect information about their customers’ use of the network,” the...more