• Video
    Oct 10, 2012

    Motorola Mobility's CSO ID's Common Cybersecurity Mistakes

    There are numerous steps mobile users can take to keep themselves safe from cyberthreats, but Motorola Mobility's Chief Security Officer Jason Ruger believes many aren't doing them right and are leaving themselves vulnerable.

  • Video
    Oct 10, 2012

    Sharing Information with Industry

    The Department of Defense's Deputy CIO for C4 and Information Infrastructure Capabilities Major General Robert Wheeler discusses the need for the DOD to talk with industry...

  • Video
    Jul 10, 2013

    A Culture of Cybersecurity

    NCSA's Michael Kaiser discusses the importance of creating a culture of cybersecurity for consumers.

  • Video
    Jul 10, 2013

    Talking to Consumers about Cybersecurity

    NCSA's Michael Kaiser talks about rethinking the way the industry talks about mobile cybersecurity.

  • Video
    Jul 10, 2013

    Security for Critical Infrastructure

    Ari Schwartz discusses how the executive order for cybersecurity defines and treats critical infrastructure.

  • Video
    Jul 10, 2013

    Executive Order on Cybersecurity

    Senior Policy Advisor for U.S. Dep. of Commerce Ari Schwartz talks about engaging with industry stakeholders.

  • Video
    Jul 8, 2013

    More Mobile, More Threats

    AT&T’s Chris Boyer discusses how the rise in mobility has created a target rich environment for attackers.

  • Video
    Jul 8, 2013

    Rapid Evolution of Malware

    Kaspersky Lab’s Chris Doggett discusses the rapid growth of malware over the past two decades.

  • Video
    Jul 8, 2013

    The Mobile Cybersecurity Opportunity

    AT&T's Chris Boyer discusses creating a proactive environment in response to cyberthreats.

  • Video
    Jul 8, 2013

    Why Attack a Cellphone?

    Kaspersky Lab's Chris Doggett talks about information on mobile attractive to cyberthieves.

  • Video
    May 22, 2013

    Enterprise App and Device Security

    Security for IT professionals is a challenge, as they balance the needs of their company and employees.

  • Video
    May 22, 2013

    Target Leverages Wireless

    Target’s Beth Jacob discusses how mobile is helping deliver on their brand promise of "expect more, pay less."

  • Video
    May 22, 2013

    Mobile Security and OS Challenges

    Kaspersky Labs’ Chris Doggett assesses the current state of mobile security and challenges facing OS’s.

  • Glossary

    Phishing

    Messages and communications that direct consumers to bogus or malicious websites or emails that intend to trick them into sharing confidential information, such as back ...

  • CTIA Blog Posts
    Jan 8, 2014

    Growing Wireless Lists Parental Control Tools and Features

    CTIA’s Director of State Regulatory and External Affairs Matt Gerst discusses the parental control tools and features available on GrowingWireless.com.

Resource Library Search Tips

To assist you with the latest facts and info about the wireless industry, CTIA developed the Resource Library.

Learn more

Click for more facts and figures about the benefits wireless provides!

How Wireless Works

A wireless phone is a very sophisticated and versatile radio. Similar to a walkie-talkie, a cellphone receives and sends radio waves. Those radio waves, traveling through spectrum, are used to transmit voice calls and data to your mobile device anywhere, anytime.

Learn more

Latest Tweets

Growing Wireless

Get the knowledge and resources to provide a safe and rewarding wireless experience for kids.

Visit Site

Go Wireless Go Green

Thanks to wireless technology, Americans and businesses across the world are reducing their environmental impact. Learn how to "go green."

Visit site
    • Live for Super - Super Mobility Week

      Super Mobility Week

      September 9, 10 & 11, 2014
      Las Vegas, Nevada USA
      40,000 Qualified Professionals
      1,100 Exhibitors
      1,000+ Reporters & Analysts
Back to top