10 For 10: Top Compliance Stories For the Week Ending, August 2, 2025
Data Driven Compliance: Understanding the ECCTA and Its Impact on Fraud Prevention with Vince Walden
Everything Compliance: Episode 158, The No to Corruption in Ukraine Edition
Daily Compliance News: July 31, 2025. The Forgotten Generation Edition
Daily Compliance News: July 31, 2025 the Forgotten Generation Edition
Understanding BBB Ratings: Building Trust and Mitigating Risks — Regulatory Oversight Podcast
Episode 379 -- Update on False Claims Act and Customs Evasion Liability
Data Driven Compliance: Understanding the UK’s New Failure to Prevent Fraud Offense with Sam Tate
Everything Compliance: Episode 157, The Q2 2025 Great Women in Compliance Edition
Daily Compliance News: July 22, 2025, The I-9 Hell Edition
Compliance Tip of the Day: Avoiding CCO Liability
2 Gurus Talk Compliance: Episode 55 – The From Worse to Worser Edition
Daily Compliance News: July 17, 2025, The COSO Yanked Edition
Wire Fraud Litigants Beware: Fourth Circuit Ruling Protects the Banks — The Consumer Finance Podcast
All Things Investigation: Due Diligence and Drama: A Deep Dive into Art World with Daniel Weiner
Daily Compliance News: July 14, 2025, The Secret Business Sauce-Reading Edition
Adventures in Compliance: The Novels – The Hound of the Baskervilles: Uncovering Compliance – Lessons from The Hound of the Baskervilles
Compliance Tip of the Day: Lessons from Internal Control Failures
Adventures in Compliance: The Novels – The Hound of the Baskervilles, Introduction and Compliance Lessons Learned
Compliance Tip of the Day: Assessing Internal Controls
Businesses should be aware of growing security risks from North Korean IT workers targeting freelance contracts from businesses in the U.S. and other countries. Typically, these workers fraudulently claim they are from the US...more
We have educated our readers about phishing, smishing, QRishing, and vishing scams, and now we’re warning you about what we have dubbed “snailing.” Yes, believe it or not, threat actors have gone retro and are using snail...more
We have repeatedly warned our readers about malicious QR codes and their use by threat actors. Threat actors are now using these codes to disguise packages as gifts....more
This week, I received a fake text message (a smish) saying my E-ZPass account was overdue and that I urgently needed to pay it. That’s a new one and, apparently, quite effective. Luckily, I knew it was a scam, but others were...more
“It’s the most wonderful time of the year”—or is it? Unfortunately, it can be the most wonderful time for criminals, who try to prey on financial generosity through scams and frauds. Extra vigilance is needed during the...more
I often get asked whether law enforcement is making any headway in catching cybercriminals. Although it is a challenging task, a recent example of a big win for law enforcement deserves celebration....more
ComplexDiscovery’s Editor’s Note: Deepfake technology represents one of the most pressing challenges for cybersecurity and governance professionals today....more
DocuSign is a great and efficient way to obtain authentic signatures for contracts and invoices. As with other efficient tools, threat actors will and have found a way to use the DocuSign API to send fake invoices to divert...more
Threat actors never miss an opportunity to use recent events to infect computer systems or quickly and easily gather personal information. The Corporate Transparency Act (“CTA”) is just such an opportunity and businesses and...more
Independent school business officers are tasked with a wide range of responsibilities, including payroll, accounting, accounts payable, investments, and facility security. Unfortunately, many independent schools are...more