12 Days of Regulatory Insights: Day 2 – AI Under Scrutiny — Regulatory Oversight Podcast
Hosted Payload S2.E1: Caroline Van Wie/Working Girl
Hosted Payload Episode 12: Mike Carlson / Spaceman
Hosted Payload Episode 11: Erin Boone/Interstellar
A Deep Dive Into Broadband Equity, Access, and Deployment With Scott D. Woods — TAG Infrastructure Talks Podcast
Hosted Payload Episode 10: Jeanine Poltronieri/For All Mankind (Season 1)
Hosted Payload Episode 7: Wiley All-Stars / Starship Troopers
Hosted Payload Episode 6
[Podcast] Hosted Payload Episode 4
[Podcast] Hosted Payload Episode 3
The Business and Legal Case for EMCs and Broadband - TAG Infrastructure Talks Podcast
Investigative Power: Utilizing Self Service Solutions for Internal Investigations?
[Podcast] Broadband and Beyond: A Conversation with NTIA Administrator Alan Davidson
Corruption, Crime, and Compliance - A Deep Dive into KT Corp's SEC Settlement for FCPA Violations
Cybersecurity and 889 Compliance in 2021: What Government Contractors Need to Know
CF on Cyber: An Update on the Florida Security of Communications Act (FSCA)
Investing in Colombia: Infrastructure Trends and 5G Concessions
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Telecommunication Consumer Protection Act (TCPA): Update and Practical Guidance
Navigating Section 889 of the 2019 National Defense Authorization Act
Does Cellular 5G Equal 5x the Fraud and Misconduct Risk?
The wireless industry has revolutionized the way we connect, from facilitating teleworking, distance learning, and telemedicine to allowing the American public to interact virtually in almost all other aspects of their daily...more
U.S. federal agencies, including the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Federal Bureau of Investigation (FBI) (in coordination with similar agencies in Australia,...more
According to statements by the Cybersecurity and Infrastructure Security Agency (CISA), the People’s Republic of China-backed (PRC) hacking group Salt Typhoon, which attacked telecommunications providers last month, is still...more
In the hyper-connected era of smart manufacturing, accelerated by “Industry 4.0,” the manufacturing sector is undergoing a digital revolution. By leveraging technologies such as advanced automation, artificial intelligence,...more
The Second Session of the Standing Committee of the 14th National People’s Congress voted and passed on April 26, 2023 the newly revised “Anti-Espionage Law of the People’s Republic of China” (the New Anti-Espionage Law). The...more
On April 25, 2023, the Federal Communications Commission (FCC or Commission) released an Order and Notice of Proposed Rulemaking on international Section 214 authorizations (the Order and NPRM), which authorize the provision...more
The Biden Administration released its National Cybersecurity Strategy (Strategy) in an effort to reshape U.S. policy and priorities around cybersecurity for the public and private sectors, marking a significant shift in tone...more
In November, the bipartisan Infrastructure Investment and Jobs Act (the “Act”) was enacted into law. In addition to reauthorizing existing programs, the Act adds $550 billion in funding for new infrastructure investments,...more
The COVID-19 pandemic and the serious supply chain vulnerabilities it exposed have led to a seismic shift in U.S. policy and regulation, from stepped-up measures to protect U.S. technology, intellectual property and data from...more
This White Paper presents a high-level overview of the current cybersecurity legislation in force or proposed at the European Union (EU) level as well as in a selection of EU member states. - This White Paper is not an...more
With the imminent rollout of new 5G mobile networks, the European Union (EU) and its member states are looking to adequately frame and safeguard the secure implementation of this new key technology. On top of that, foreign...more
The anti-corruption and bribery enforcement landscape is constantly evolving. Companies operating in the Aerospace, Defense, and Government Services (ADG) industry sector must therefore vigilantly track developments in this...more
On November 27, 2019, the U.S. Department of Commerce (“Commerce”) published a proposed rule, “Securing the Information and Communication Technology and Services Supply Chain,” that would implement Executive Order 13873 of...more
The UK 5G debate is emblematic of protectionist sentiments in the technology sector. Huawei and the technology cold war - Huawei Technologies Co., Ltd. is a modern Chinese success story. A pioneer in the telecommunication...more
On March 27, 2019, the German Federal Ministry of the Interior (GMI) proposed a new bill (the "Draft Bill") for a so-called IT Security Act 2.0 (IT-SiG 2.0). In an effort to take a front-runner role in Europe, Germany has...more
“New threats and a new era of strategic competition” have prompted the White House to roll out a new National Cyber Strategy. As identified below, the Strategy contains important priority initiatives that will advantage many...more
The U.S. Government is renewing its focus on mitigating technological risks by regulating the supply chain for various goods and services. ...more
Another step forward filling in blanks in the cyber security law or more questions than answers? On 11 July 2017, the China Cyberspace Administration ("CAC") released the draft Key Security ("Draft Regulations") for public...more
On 11 April 2017 the Cyberspace Administration of China published a circular calling for comments on its draft Security Assessment for Personal Information and Important Data Transmitted Outside of the People’s Republic of...more