Skip to Content

Information Security Demands More Than Privacy Laws Compliance

Protecting personal information is necessary to comply with California’s CCPA and various state and federal laws, but it goes much further.  Companies must protect the underpinnings of their businesses – their intellectual property, trade secrets, and highly sensitive communications – against unauthorized access, use, or disclosure. Listen to this 12 […]

Voice is (Not) Dead

For nearly 15 years, telecom industry pundits have declared the death of voice, or at least the death of the traditional PSTN network.  This claim that voice is dead is a bit overstated, but one could reasonably argue that it’s now on life support.  Listen to this 10 minute podcast […]

Voice is (NOT) Dead

For the last decade, the industry and press have declared the death of voice, or at least the traditional PSTN network.  Like the premature report of Mark Twain’s death, the reports are exaggerated, but not without merit.  Voice is dying, but it is not dead; in the telecom industry, change […]

Information Security Demands More than Privacy Laws Compliance

The California Consumer Privacy Act has made headlines in recent weeks (including in several LB3 podcasts “A Summary CCPA Procurement and Compliance Guide for Your IT and Telecoms Agreements” and “How the California Consumer Privacy Act of 2018 Affects Your Service Provider Agreements“); this week because the California Attorney General […]

Catching the 5G Wave – Part 2

In this second episode of the two-part podcast series Catching the 5G Wave, TC2’s David Lee and Joe Schmidt continue their discussion on how 5G will impact the enterprise.  David and Joe explain why new devices are needed to take advantage of the faster speeds, lower latency, and guaranteed service […]