False Claims Act Insights - Beyond Adversarialism: How to Steer FCA Investigations
Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
Fierce Competition Podcast | Antitrust Collusion in Labor Markets: Enforcement Trends on Both Sides of the Atlantic
Podcast - An Overview of State Attorney General Consumer Protection Enforcement
LathamTECH in Focus: Move Fast, Stay Compliant
Compliance Tip of the Day: Key M&A Enforcement Actions
Compliance into the Weeds: A Deep Dive into Cadence Design Systems’ Export Control Violations
Daily Compliance News: August 1, 2025, The All AI Edition
From the Editor’s Desk: Compliance Week’s Insights and Reflections from July to August 2025
Everything Compliance: Episode 158, The No to Corruption in Ukraine Edition
Daily Compliance News: July 31, 2025. The Forgotten Generation Edition
Mid-Year Labor & Employment Law Update: Key Developments and Compliance Strategies
Disparate Impact & Enforcement Rollbacks: What’s the Tea in L&E?
CSC Guidance Unveiled: NIL Enforcement and Implications for Collectives — Highway to NIL Podcast
Episode 379 -- Update on False Claims Act and Customs Evasion Liability
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Cease and Desist Letters: Protecting Your Intellectual Property the Right Way
PODCAST: PODCAST: Williams Mullen's Trending Now: An IP Podcast - Cease and Desist Letters: Protecting Your Intellectual Property the Right Way
Data Driven Compliance: Understanding the UK’s New Failure to Prevent Fraud Offense with Sam Tate
Daily Compliance News: July 25, 2025, The New Sheriff in Town Edition
Quick Guide to Administrative Hearings
The potential criminalization of activities associated with ransomware cyber attacks, including ransom payments by victims, has long been an unresolved issue. This concern has now led Italy to introduce a ground breaking...more
Recent enforcement actions highlight the increased regulatory scrutiny that private funds may face with respect to internal cybersecurity protocols and responses to cyber-crimes and cyber incidents under new and updated...more
Best Practices to Detect and Prevent File-Less and Click-Less Malware - Hackers are clever at exploiting weaknesses in an organization’s systems. They are also efficient. After an organization installs robust cybersecurity...more