12 Days of Regulatory Insights: Day 2 – AI Under Scrutiny — Regulatory Oversight Podcast
Hosted Payload S2.E1: Caroline Van Wie/Working Girl
Hosted Payload Episode 12: Mike Carlson / Spaceman
Hosted Payload Episode 11: Erin Boone/Interstellar
A Deep Dive Into Broadband Equity, Access, and Deployment With Scott D. Woods — TAG Infrastructure Talks Podcast
Hosted Payload Episode 10: Jeanine Poltronieri/For All Mankind (Season 1)
Hosted Payload Episode 7: Wiley All-Stars / Starship Troopers
Hosted Payload Episode 6
[Podcast] Hosted Payload Episode 4
[Podcast] Hosted Payload Episode 3
The Business and Legal Case for EMCs and Broadband - TAG Infrastructure Talks Podcast
Investigative Power: Utilizing Self Service Solutions for Internal Investigations?
[Podcast] Broadband and Beyond: A Conversation with NTIA Administrator Alan Davidson
Corruption, Crime, and Compliance - A Deep Dive into KT Corp's SEC Settlement for FCPA Violations
Cybersecurity and 889 Compliance in 2021: What Government Contractors Need to Know
CF on Cyber: An Update on the Florida Security of Communications Act (FSCA)
Investing in Colombia: Infrastructure Trends and 5G Concessions
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Telecommunication Consumer Protection Act (TCPA): Update and Practical Guidance
Navigating Section 889 of the 2019 National Defense Authorization Act
Does Cellular 5G Equal 5x the Fraud and Misconduct Risk?
With the rise in social media usage and the comfort with which people are expressing their thoughts and views on social media, many users do not realize the real-life implications of their online activities. Time and again,...more
The U.S. Attorney’s Office for the District of Massachusetts has charged a student at Assumption University with hacking into two U.S.-based companies’ systems and demanding a ransom....more
In this fast-growing digital world, many people depend on and use virtual private networks (VPNs) to protect online privacy and safety. However, residents and citizens need to know the legality of using VPNs under UAE law....more
In early October 2025, several media outlets reported that United States telecommunications services had been infiltrated by state affiliated threat actors linked to the People’s Republic of China (“PRC”). These reports were...more
On December 21, 2023, the Federal Communications Commission released an order updating its data breach rules. These updated rules require telecommunications providers to report breaches of customer proprietary network...more
In the hyper-connected era of smart manufacturing, accelerated by “Industry 4.0,” the manufacturing sector is undergoing a digital revolution. By leveraging technologies such as advanced automation, artificial intelligence,...more
New Campaign Targets Telecom and Business Process Outsourcing Corporations - An increase in the targeting of telecommunications and business process outsourcing (BPO) companies has been identified and tied to a new...more
Executive Summary - The North Korean threat to the crypto ecosystem is the highest form of immediate risk to the crypto-economy driven by a regime that seeks to profit from its misuse to reinforce its regime and fuel all its...more
The Federal Bureau of Investigations (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) recently issued an alert warning the public about vishing campaigns....more
A mounting death toll (over 106 and counting) and fears of a coronavirus pandemic sent markets tumbling early on Monday and kicked off a selloff that continued all day....more
On March 27, 2019, the German Federal Ministry of the Interior (GMI) proposed a new bill (the "Draft Bill") for a so-called IT Security Act 2.0 (IT-SiG 2.0). In an effort to take a front-runner role in Europe, Germany has...more
“New threats and a new era of strategic competition” have prompted the White House to roll out a new National Cyber Strategy. As identified below, the Strategy contains important priority initiatives that will advantage many...more
I am speaking at a conference in one of my favorite cities (okay, it’s Chicago) and I was having dinner at the bar when the patron next to me asked me what I do for a living. ...more
Verizon's Protected Health Information Data Breach Report Concludes that Insiders Are Greatest Threat to Health Care Entities - Verizon recently issued its Protected Health Information Data Breach Report, which is always...more
New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more
An anonymous hacker has contacted the New York Post to explain how he was able to hack into the CIA Director’s AOL email account. According to several reports, a high school student and his two friends implemented social...more
In the span of two days, mobile device users learned of two data breaches that could compromise their personal data. In one, Experian (a credit reporting agency) reported that it was hacked, potentially putting 15 million...more
The October blog post will be broken up into two parts. This October 15th post will comment on the TPP Agreement signed today and well as President Xi Jinping’s recent trip to the US and my impressions from Beijing, China...more
On October 5, the 12 Trans-Pacific Partnership (“TPP”) countries announced that they had resolved all remaining issues and reached a final agreement on the long-anticipated regional free-trade agreement. As King & Spalding...more
What is the Internet of Things? The 'Internet of Things' (IoT) is a catchphrase describing the increasing interconnectedness between smart devices and sensors facilitated through their connection to the internet. It's not a...more
It is being reported that 95% of all Android smartphones are vulnerable to being hacked with a text message, which is being called the “heartbleed for mobile.” According to security experts, the vulnerability exploits the...more
On July 6, 2015, China’s legislature, the National People’s Congress (NPC), circulated for comment two pieces of draft legislation with significant potential implications for data privacy and data security in China. Comments...more