News & Analysis as of

Cybersecurity Information Sharing Act (CISA) National Security Telecommunications

Womble Bond Dickinson

Cybersecurity: Salt Typhoon’s Persistence is a Cruel Lesson for Smaller Providers

Womble Bond Dickinson on

This article is based on Carri Bennet’s April 9th presentation at the Palmetto Broadband Coalition Annual Convention in Greenville, S.C. In December 2024, the White House’s Deputy National Security Adviser for Cyber and...more

Wiley Rein LLP

Wireless Roundup (January 2025)

Wiley Rein LLP on

FCC Seeks Comment on Proposed Requirements for Covered Text Providers Under the 988 Suicide & Crisis Lifeline: In this Third Further Notice of Proposed Rulemaking (FNPRM), the Federal Communications Commission (FCC) requests...more

Perkins Coie

Salt Typhoon Cyberattacks: New Federal Cybersecurity Guidelines for Telecoms

Perkins Coie on

U.S. federal agencies, including the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Federal Bureau of Investigation (FBI) (in coordination with similar agencies in Australia,...more

Alston & Bird

Congressional Research Service Report Sheds Light on October Telecommunications Attack by PRC-Linked Threat Actor

Alston & Bird on

In early October 2025, several media outlets reported that United States telecommunications services had been infiltrated by state affiliated threat actors linked to the People’s Republic of China (“PRC”). These reports were...more

Wiley Rein LLP

Wireless Roundup (September 2024)

Wiley Rein LLP on

FCC Seeks Comment on Promoting the Integrity and Security of Telecommunications Certification Bodies, Measurement Facilities, and the Equipment Authorization Program: In this Notice of Proposed Rulemaking (NPRM), the Federal...more

Wiley Rein LLP

President’s Telecom Advisors Promote Zero Trust Architecture in Key Report

Wiley Rein LLP on

What: On February 23, 2022, the National Security Telecommunications Advisory Committee (NSTAC) approved a final draft of its forthcoming report to the President on Zero Trust and Trusted Identity Management. ...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide