State AG Pulse | An Early Peek At the 2026 State AG Elections
The Rise of OTAs in Defense Contracting: Opportunities, Risks, and What Contractors Need to Know
Quick Guide to Administrative Hearings
The JustPod: What Do the Lubavitcher Rebbe and the Chabad Chassidic Movement Have to Do With Criminal Justice Reform? It All Starts With “Aleph."
CHPS Podcast Episode 5: The Future of Federal Procurement
Daily Compliance News: June 19, 2025, The Corruption in Spain Edition
False Claims Act Insights - Will Recent Leadership Changes Lead to FCA Enforcement Policy Changes?
The VA Primary – A Bellwether For the Country?
DOL Restructures: OFCCP on the Chopping Block as Opinion Letters Expand - #WorkforceWednesday® - Employment Law This Week®
Enforcement Priorities of the Second Trump Administration: The False Claims Act
Project Catalyst: An Economic Development Podcast | Episode 14: Shaping North Carolina’s Economic Future with Secretary of Commerce Lee Lilley
ADA Compliance for Medical and Dental Practices: Responding to Inquiries and Investigations
Work This Way: A Labor & Employment Law Podcast | Episode 45: New Leadership at Employment-Related Federal Agencies with David Dubberly of Maynard Nexsen
What Every Law Firm Leader Can Learn from Law Day and the Perkins Coie Ruling: On Record PR
State AG Pulse | The Inside Scoop: On Being Chief Deputy
Compliance Tip of the Day: Standing at the Turning Point
100 Days In: What Employers Need to Know - Employment Law This Week® - #WorkforceWednesday®
Leadership and Innovation at the Illinois AG's Office — Regulatory Oversight Podcast
Breaking Down the Shifting Vaccine Policy Landscape – Diagnosing Health Care Video Podcast
Revolving Door Rules: What You Need to Know Before Hiring from (or Heading to) Government
Since the full enforcement of Thailand’s Personal Data Protection Act B.E. 2562 (2019) (“PDPA”) in June 2022, the Personal Data Protection Committee (“PDPC”) has moved decisively from awareness-building to active enforcement....more
This monthly report outlines key developments in China’s data protection sector for June. TC260 Two Cybersecurity Practice Guidelines on Personal Information Protection Compliance Audits: On May 19, 2025, TC260 issued two...more
On June 6, 2025, President Trump issued a new executive order, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144” (EO), signaling the construction...more
The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more
The National Security Agency’s Artificial Intelligence, Security Center (AISC), together with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals...more
This monthly report outlines key developments in China’s data protection sector for March. The following events merit special attention...more
The Trump administration has systematically fired federal privacy- and security-focused employees since taking office. Three members of the bipartisan, independent agency, the Privacy and Civil Liberties Oversight Board...more
The Department of Justice (DOJ) released a Final Rule restricting certain transfers of Americans’ sensitive personal data to identified countries of concern or covered individuals. The Final Rule continues to assert the DOJ...more
Former President Joe Biden issued an Executive Order (EO) entitled “Strengthening and Promoting Innovation in the Nation’s Cybersecurity” on January 16, 2025. The EO is designed to...more
In light of recent cyberattacks targeting the federal government and United States supply chains, President Biden’s administration has released an Executive Order (the “Order”) in an attempt to modernize and enhance the...more
New standardized cybersecurity compliance requirements are inbound. In early October 2023, the Federal Acquisition Regulation (FAR) Council issued a proposed rule (Proposed Rule) to standardize cybersecurity requirements...more
The federal government recently issued an interim rule, effective immediately, prohibiting the presence or use of the TikTok application in the performance of a contract. This rule continues the government’s actions against...more
The White House announced last Thursday its highly anticipated National Cybersecurity Strategy (NCS). Although largely aspirational and short on concrete plans, the 39-page NCS is the Biden administration’s most ambitious...more
Yesterday we continued our series... with the Office of Management and Budget’s September 2022 memorandum requiring federal agencies to only use software from software producers that attest compliance with secure software...more
Government agencies at the state and federal levels are increasingly training their sights on the cybersecurity resiliency of companies in an array of industries. The US Securities and Exchange Commission has proposed rules...more
The White House recently issued a Memorandum designed to strengthen the cyber defenses of “National Security Systems” – information systems operated by the federal government that are used for intelligence or military...more
Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more
How is a refrigerator like a stoplight camera and a delivery drone? Each of these devices and hundreds of millions of others are part of the internet of things (IoT), meaning that manufacturers are building them with sensors...more
Last night, the Senate passed by unanimous consent H.R. 1668, the Internet of Things (IoT) Cybersecurity Improvement Act. The House had previously passed the bill by voice vote in September after lengthy negotiations with...more
Our Virtual Regional Healthcare Compliance Conferences provide updates on the latest news in regulatory requirement, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask...more
“Internet of Things” devices are listening. And now the federal government is taking notice. As we reported in our Government Contracts and Investigations blog, to date, federal cybersecurity regulations for government...more