Cybersecurity Telecommunications

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

The Internet of Things

In this Presentation: - Internet of Things - definition - But what is it all about? - But not just that... - The IoT market in figures... - Beecham Research - view of the World - The Connected...more

German Parliament's IT-Security Act Covers Critical Infrastructure

On June 12, 2015, the German Parliament (Deutscher Bundestag) passed an Act to Improve the Security of Information Technology Systems ("IT-Security Act"). The new legislation requires operators of so-called critical...more

European Commission Publishes Strategy on the Digital Single Market

On 6 May the European Commission released the EU’s Digital Single Market strategy (the ‘DSM Strategy’), with the declared objective to tear down the obstacles to doing business online. The DSM Strategy has been released...more

House Passes the National Cybersecurity Protection Advancement Act

Following Wednesday’s approval of the Protecting Cyber Networks Act (H.R.1560) (“PCNA”), the House of Representatives passed the National Cybersecurity Protection Advancement Act (H.R. 1731) (“NCPAA”) on Thursday, a move...more

House Passes New Cybersecurity Legislation Amidst Growing Pressure from Industry

The House of Representatives passed the Protecting Cyber Networks Act (H.R.1560) (“PCNA”) yesterday, amidst growing pressure from industry to enact legislation that would help companies harden key infrastructure and respond...more

FCC Communications Security, Reliability, and Interoperability Council Working Group Issues Final Report on Cybersecurity Best...

A Federal Communications Commission (FCC) working group, Cybersecurity Risk Management and Best Practices Working Group 4 (WG4), of the Communications, Security, Reliability, and Interoperability Council (CSRIC) advisory...more

Communications Industry Advisory Committee to FCC Issues Major Cybersecurity Report

Wednesday the advisory committee charged by the Federal Communications Commission (FCC) with providing critical assistance to the communications industry with a sector-specific implementation of cybersecurity risk management...more

FCC Plans $10 Million Cybersecurity Fine Against Two Telecoms

On October 24, 2014, the Federal Communication Commission (“FCC”) took a big step into the cybersecurity regulatory space when it announced its intent to assess a $10 million fine against two telecoms, TerraCom and YourTel...more

Connected Cars – legal issues and hurdles!

Connected cars are expected to generate $ 131.9 billion by 2019 with a compound annual growth rate (CAGR) of 34.7% from 2013 to 2019. But such growth shall face legal issues that not only affect data protection matters, but...more

A CTO’s Views On How To Combat Hackers & Cybercriminals

In this article, I delve into the views and opinions of a chief technology officer of a telecommunications company to understand important steps a company can take to combat hackers and cyber-criminals....more

Comptroller Curry Takes Vendor Management Message To Third-Party Providers

On April 16, Comptroller of the Currency Thomas Curry spoke to attendees of the Consumer Electronics Show Government Conference, taking his concerns about banks’ vendor relationships and cybersecurity risks to potential...more

Belgium: New Belgian data retention legislation for telecom operators

Belgium has enacted new data retention legislation on 30 July 2013. Telecom operators must now store communications traffic data, location data, data identifying the end-user, data on the communication service used and on the...more

FCC: Carriers Must Protect Certain Data Collected on Mobile Handsets

Aiming to “address the real privacy and security risks that consumers face when telecommunications carriers use their control of customers’ mobile devices to collect information about their customers’ use of the network,” the...more

Financial Services Report - Quarterly News, Summer 2013

In This Issue: Arbitration Report; Bureau Report; Privacy Report; Mortgage Report; Operations Report; Preemption Report; and Beltway Report. Excerpt from Arbitration Report: Ninth Circuit Punts...more

Congressional Committee Finds Huawei And ZTE To Be Threats To National Security By Shannon Doyle

On October 8, 2012, the House Permanent Select Committee on Intelligence (“the Committee”) published a report declaring two Chinese telecommunication equipment manufacturers, Huawei Technologies Company and ZTE, to be threats...more

U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE

Full text copy of "U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE," the House Committee on Intelligence report that found “the risks associated with [Chinese telecom companies]...more

17 Results
|
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×