AI Today in 5: August 7, 2025. The US v. China Episode
Compliance into the Weeds: A Deep Dive into Cadence Design Systems’ Export Control Violations
10 For 10: Top Compliance Stories For the Week Ending, August 2, 2025
Daily Compliance News: August 1, 2025, The All AI Edition
Daily Compliance News: July 25, 2025, The New Sheriff in Town Edition
All Things Investigations – Navigating Secondary Tariffs with Mike Huneke and Brent Carlson
FCPA Compliance Report: The Impact of Secondary Tariffs on Global Trade with Mike Huneke and Brent Carlson
Daily Compliance News: July 21, 2025, The More Reasons Not to Go to China Edition
Regulatory Ramblings: Episode 73 - Geopolitical Risk: Thai Tensions / Sanctions, Tariffs & FCPA Enforcement in Asia
Daily Compliance News: June 23, 2025, The Is Walmart Cool Edition
Regulatory Ramblings: Episode 71 – Crypto Fault Lines: Stablecoins, Meme Coins & the Fight for Clarity PLUS: Sanctions, Shell Companies & Fragmented Global Trade
Episode 372 -- DOJ Applies False Claims Act to Tariff and Trade Violations
Hot Topics in International Trade - Tariff Mitigation Strategies
Daily Compliance News: May 30, 2025, The Leissner Sentenced Edition
Regulatory Ramblings: Episode 70 – Lessons for Compliance from a Law Enforcement Career + Regional Geopolitical Risks in 2025 with Mark Nuttall and Steve Vickers
Daily Compliance News: May 21, 2025, The I Want You Back Edition
Hot Topics in International Trade Terrified by Tariffs Braumiller Law
2 Gurus Talk Compliance: Episode 52 – The Big Jet Plane Edition
10 For 10: Top Compliance Stories For the Week Ending May 10, 2025
Daily Compliance News: May 6, 2025 the Made in China Edition
Last month, Paul Hastings sponsored the Cybersecurity Law Workshop at the Spring Privacy & Security Forum held at George Washington University in Washington, D.C. The Cybersecurity Law Workshop featured three panels of...more
On April 8, 2025, a sweeping rule issued by the US Department of Justice (DOJ) will take effect. The rule imposes restrictions—and in some cases, outright prohibitions—on US companies in connection with certain types of data...more
The Google Threat Intelligence Group (GTIG) recently published a new report “Adversarial Misuse of Generative AI,” which is well worth the read. The report shares findings on how government-backed threat actors use and misuse...more
Major U.S. companies targeted by North Korean threat actors disguised as remote IT workers. Multiple individuals responsible for stealing millions of dollars have already been apprehended by U.S. authorities....more
While there have been major developments in areas such as data security, cloud computing, and artificial intelligence over the past year, threat actors are becoming increasingly aggressive, sophisticated, and in some cases,...more
An inherent aspect of any new technology is that it doesn’t take long for bad actors to figure out how it can be weaponized for nefarious purposes. Cyber-related technologies represent an increasingly dangerous area of risk...more
Editor’s Note: On July 27, 2022, HaystackID shared an educational webcast on the topic of Committee on Foreign Investment in the United States (CFIUS) compliance. CFIUS is a U.S. government interagency committee with the...more
ACI’s Annual Flagship Conference on Economic Sanctions Enforcement and Compliance is widely regarded as the premier conference designed for those working in global sanctions compliance, internal audits and investigations,...more
Welcome to Foley’s new Manufacturing MarketTrends newsletter. In each edition, we will highlight key trends to watch out for in 2019, making it a year of change for manufacturers. ...more
Arrest of a Chinese National on Hacking Charges Illustrates How U.S. Tactics Are Changing to Meet the New Cyber Threat - In August, Yu Pingan, a Chinese national, was arrested on charges that he conspired to acquire and...more
Focusing on overseas cyber threats, President Obama issued an Executive Order on April 1, 2015, which grants authorization to impose sanctions on individuals and entities engaged "in malicious cyber-enabled activities that...more