(Podcast) The Briefing: Trademark Basics – Protecting Names, Logos, and Brands in Entertainment
The Briefing: Trademark Basics - Protecting Names, Logos, and Brands in Entertainment
Want to use a positioning cheat code? Try "early bird" thought leadership.
Daily Compliance News: July 29, 2025 the Is CEO Conduct Ever Personal Edition
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Cease and Desist Letters: Protecting Your Intellectual Property the Right Way
PODCAST: PODCAST: Williams Mullen's Trending Now: An IP Podcast - Cease and Desist Letters: Protecting Your Intellectual Property the Right Way
You should be talking about philosophies—not just tactics—in your thought leadership
Mickey Mouse: un ratón con abogado
The Briefing: The Ninth Circuit Puts the Brakes on Eleanor’s Copyright Claim
(Podcast) The Briefing: Who Owns Jack Nicklaus? Lessons for The Creator Economy From a Brand Battle
The Briefing: Who Owns Jack Nicklaus? Lessons for The Creator Economy From a Brand Battle
(Podcast) The Briefing: Trademark Smoked: The Fall of General Cigar’s COHIBA Registration
The Briefing: Trademark Smoked: The Fall of General Cigar’s COHIBA Registration
(Podcast) The Briefing: When a TikTok Costs You $150,000 - Copyright Pitfalls in Influencer Marketing
The Briefing: When a TikTok Costs You $150,000 - Copyright Pitfalls in Influencer Marketing
(Podcast) The Briefing: Influencer Fail – ALO Yoga & Influencers Named in $150M Class Action Lawsuit for FTC Violations
The Briefing: Trademark Mayhem – Lady Gaga Gets Sued for Trademark Infringement
What Were the Cooler Wars? (Part 1) — No Infringement Intended Podcast
The Briefing: The Stanley Cup Clash - A Trademark Battle (Podcast)
The Briefing: The Stanley Cup Clash - A Trademark Battle
Businesses invest an immense amount of time, effort, and financial resources into building their brand identity and overall cultivating a strong foundation of consumer trust. This trust is not only a cornerstone of a brand’s...more
We are seeing an increase in cybersquatting incidents. What is cybersquatting and how can it affect you? According to Sentinel One, cybersquatting, or domain squatting, “involves the registration, selling, or use of an...more
In the face of the ever-growing threat of cyberattacks disguised in emails from phishers, impostors and other increasingly sophisticated security scammers, Google has launched a tool to allow organizations to fight back by...more
We often think of phony financial institution emails as a bad actor’s phishing scheme of choice to capture confidential bank account numbers or other private financial information. While those phishing emails certainly do...more
Ransomware Attacks Predicted to Occur Every 11 Seconds in 2021 with a Cost of $20 Billion - Confirming what we are seeing in the field, cybersecurity firm Cybersecurity Ventures has predicted that, globally, businesses in...more
A new study by Check Point Research shows that cyber criminals are using well-known brands to lure victims into clicking on nefarious links, providing personal information or credentials, or getting users to transfer money....more
Welcome to our latest edition of Retail Rap. From influencer marketing to launching a startup and ensuring digital advertising complies with the latest regulations, retail issues are making news—and presenting legal...more
The National Cyber Security Centre (NCSC), an organisation of the UK Government that provides cybersecurity advice and support for the public and private sector, published an article earlier this year relating to a recent...more
During the Annual INTA 2019 Meeting, a panel was held on the EU General Data Privacy Regulation (GDPR) and the temporary removal of data for the WHOIS directory. IPMT Partner David Taylor spoke on the following GDPR issues...more
There are so many data breaches in the news these days that it is hard even for us to keep up, and this is our day-to-day profession. ...more
Cybersecurity researchers at the Dell SecureWorks Counter Threat Unit (“Dell CTU”) uncovered a network of approximately 25 fake LinkedIn profiles that Dell CTU believes were used by an Iran-linked hacker group to establish at...more
By now you’ve probably heard of Snapchat. But if you are not among its growing core base of users between 13 and 23 years of age (probably a good deal younger than you, constant reader) there’s a good chance you are not a...more