We get Privacy for work — Episode 8: The Surge in Data Breach Lawsuits: Trends and Tactics
The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd
We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One
Under the Radar: DOJ's Data Security Rules and Their Impact on Payments Companies — Payments Pros – The Payments Law Podcast
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 243: HIPAA Compliance and Potential Changes with Shannon Lipham of Maynard Nexsen
We get Privacy for work: The Privacy Pitfalls of a Remote Workforce
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
Driving Digital Security: The FTC's Safeguards Rule Explained — Moving the Metal: The Auto Finance Podcast
Privacy for Risk Management: Bridge the Business, Technology and Compliance Gaps
Innovation in Compliance: Real-Time Fraud Prevention Strategies for Financial Loss Prevention with Vince Walden
Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder
Compliance and AI: Using AI for Data Loss Prevention Systems with Vinay Goel
Safeguarding Your Business Data
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Top Healthcare Compliance Priorities for 2025
Business Better Podcast Episode: Bridging Campuses: Legal Insights on Education Industry Consolidation – Privacy and Data Security
Episode 366 -- DOJ Issues Data Security Program Requirements
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
The threat landscape is evolving, regulatory expectations are rising, and the stakes are higher than ever as digital health intersects with artificial intelligence. Join legal, compliance, and security experts from Wilson...more
Artificial Intelligence is no longer an experiment in the legal industry—it’s here, and it’s changing how we serve clients every day. At the same time, it challenges us to safeguard a cornerstone of our profession:...more
Read takeaways from our recent M365 Academy webinar on sensitivity labels, which covered how labels support governance across M365, from taxonomy design and classification to Copilot oversight, DLP, Insider Risk, and...more
At the same time that AI chatbots and tools have begun reshaping how businesses operate — including how they strategize, optimize workflows, perform R&D and distill large amounts of information — individuals, including...more
On August 28th, Mandiant issued an update to its previous Salesloft Drift advisory. Therein, Mandiant discussed that Salesloft issued a security notification on Aug. 26 regarding its Drift application. At that time, it...more
Your associates are using ChatGPT. Right now. While you're reading this. According to Pew Research data from June 2025, 34% of U.S. adults have used ChatGPT, double the rate from 2023. Among adults under 30, that number jumps...more
Learn how Microsoft Purview sensitivity labels, coupled with a sound data classification strategy, reduce over-exposure without hampering collaboration. M365 expert Marta Pucci explains what labels do, the strategic benefits...more
Summary: Traditional data loss prevention tools and workflows weren’t designed to mitigate risks introduced by AI prompts, cloud-native workflows, and browser-based tools. This infographic provides a roadmap data protection...more
Salesloft issued a security notification on August 26 regarding its Drift application. It appears to be a broad opportunistic attack on Salesloft/Drift instances integrated with Salesforce tenants. Salesloft issued updates...more
IBM and the Ponemon Institute have released the 2025 Cost of a Data Breach Report. The report, which has become an annual late-summer tradition, highlights the evolving risks and costs associated with data breaches. This...more
One key lesson from the ongoing ransomware epidemic is clear: threat actors don’t discriminate. It doesn’t matter who you are or what your business does — if they see an opening, they’ll exploit it, ready or not. Despite...more
Outside Counsel Guidelines (OCGs) are more than static billing recommendations; they are living and breathing instructions that align teams with corporate values, risk tolerance, and operational expectations. While other...more
Imagine signing off on an update to your customer support portal and later discovering that an AI agent the development team added to the portal has been quietly sending snippets of support tickets to an unsecured LLM for...more
Generative artificial intelligence (AI) is reshaping the financial services sector, moving from pilot projects into scaled enterprise adoption. CB Insights’ latest report addresses 100 actual applications of generative Al in...more
Forget the “Barbarians at the gate,” we may have bigger issues to deal with from the “Butler’s serving us at our Banquets.” While Business Email Compromise (BEC) and/or ransomware attacks have been effective cyber-crimes to...more
The Data Stream podcast dives deep into the fast-moving currents of data, technology, and the law. Presented by BakerHostetler’s Digital Assets and Data Management (DADM) Practice Group and hosted by Partners David Sherman...more
The new world of AI presents significant benefits and risks that need to be addressed in an overall governance framework. Luckily, the principles to apply here will surprise no one — governance, compliance, legal and risk...more
This update is part of our AI FAQ Series. Learn more at our AI Law Center. What questions should I ask before using an AI tool? There are a number of questions that should be considered before using an AI tool, including: (1)...more
This update is part of our AI FAQ Series. Learn more at our AI Law Center. Can I use this data to train my AI models? Whether or not you can use a particular dataset to train an AI model depends on a few different factors...more
The rapid evolution of large language models (LLMs), retrieval-augmented generation (RAG), and Model Protocol Context (MCP) implementation has led many developers and teams to quickly adopt and integrate these powerful...more
For years, if you asked a 401(k) plan sponsor what their top concern was, you’d get a predictable answer: cost. Cutting expenses. Reducing fees. Pinching pennies. And it made sense. In a post-fee lawsuit world, with advisors...more
Artificial intelligence, generative AI, machine learning, large language models and similar technologies (“AI”) are quickly becoming a mainstay of business software. There is no doubt that AI has endless possibilities as it...more
Recently proposed amendments to the Health Insurance Portability and Accountability Act (HIPAA) Security Rule are designed to enhance the cybersecurity of electronic protected health information (ePHI). These updates aim to...more
58 In the complex and highly regulated financial services environment, the cost of poor data management is staggering, estimated to cost businesses billions annually in operational inefficiencies, regulatory fines, and missed...more
As generative artificial intelligence and machine learning continue their rapid rise in popularity and uses in business operations, manufacturers are faced with how to implement AI in a manner that allows them to take...more