PODCAST: Williams Mullen's Trending Now: An IP Podcast - Cease and Desist Letters: Protecting Your Intellectual Property the Right Way
PODCAST: PODCAST: Williams Mullen's Trending Now: An IP Podcast - Cease and Desist Letters: Protecting Your Intellectual Property the Right Way
A Counterintuitive Approach to Winning Without Litigation: One-on-One with Haley Morrison
SkadBytes Podcast | Tech’s Shifting Landscape: Five Trends Shaping the Conversation
Tips for Conducting a Trade Secret Assessment with Rob Jensen
Will I Get Sued if I Create Another Hospital Drama? — No Infringement Intended Podcast
Essential Steps to Sell Your Business
Mickey Mouse: un ratón con abogado
(Podcast) The Briefing: The Ninth Circuit Puts the Brakes on Eleanor’s Copyright Claim
The Briefing: The Ninth Circuit Puts the Brakes on Eleanor’s Copyright Claim
Unexpected Paths to IP Law with Dan Young and Colin White
Why Can't I Clean the Graffiti Off My Walls? — No Infringement Intended Podcast
(Podcast) The Briefing: Trademark Smoked: The Fall of General Cigar’s COHIBA Registration
The Briefing: Trademark Smoked: The Fall of General Cigar’s COHIBA Registration
PODCAST: Williams Mullen's Trending Now: An IP Podcast - NCAA Name, Image, Likeness (NIL) Update – Effects of House Settlement
How IP Can Fuel Your Startup's Growth
Tariffs and Trade Series: What Senior Management Teams Need to Know
5 Key Takeaways | AI and Your Patent Management, Strategy & Portfolio
Two Key Considerations in NIL Deals
JONES DAY TALKS®: Women in IP – AI and Copyright Law Need-to-Knows
The Federal Communications Commission (FCC) has taken significant steps to institutionalize national security within its regulatory framework through the creation of the Council on National Security (CNS). Chaired by Chairman...more
We live in an era in which information is a valuable commodity. Access to data, ideas, and trade secrets is in high demand, particularly for individuals or companies seeking to profit from this information. One way they gain...more
As companies embrace digital transformation, they increasingly depend on proprietary technologies and data that requires robust cybersecurity measures to safeguard intellectual property (IP). Zifino and Foley & Lardner LLP...more
With the rise of generative artificial intelligence (AI) and its various synthetic media outputs, deepfakes are just one of many new risks to businesses. Deepfakes pose considerable threats to companies, potentially damaging...more
Intensifying international crises, increasing regulatory burdens, and uncertain macroeconomic conditions have led to an era of caution for manufacturers, but hidden among those challenges are exciting opportunities for...more
As applications and use cases for digital assets and their blockchain infrastructure grow and become more sophisticated, investments and valuations for businesses in these areas have grown as well. The growing number of...more
As heated debate continues over possible changes to the Foreign Intelligence Surveillance Act (FISA), which is poised to expire later this month, we wanted to provide some perspective on a few practical issues. As former DOJ...more
Agility and resiliency remain essential attributes for manufacturers in 2023. Manufacturers are no longer focused on figuring out when things will return to “normal.” Instead, they are applying lessons learned from the...more
The Environmental Protection Agency’s (EPA) rush to push billions of dollars of grant assistance to recipients has created the potential for devastating cyberattacks and intellectual property theft on water/wastewater...more
The Department of Defense (DoD) recently issued a new Small Business Strategy to reverse the significant decline in the number of small businesses participating in government contracts by launching new initiatives that will...more
On 30 July 2020, the EU designated the first individuals and entities under its 2019 sanctions framework targeting parties involved in cyber-attacks that undermine the EU’s integrity, security and economic competitiveness....more
With the COVID-19 related increase in remote work, anxious employees are being increasingly targeted by cyber criminals and hackers with phishing scams, business e-mail compromise schemes, and malicious ransomware. At the...more
We are pleased to provide you with the third annual installment of our Life Sciences and Health Care Horizons guide. For each of these guides, we have asked our industry thought leaders throughout the world to write about...more
Twenty-five years ago most companies’ greatest fear of espionage was employee theft at the photocopy machine at 2 in the morning. The company playbook could not be forwarded in an email or put on a thumb drive in a matter of...more
In the waning weeks of the Obama administration, U.S. Intellectual Property Enforcement Coordinator Daniel H. Marti, colloquially known as the “IP czar,” released the latest U.S. Joint Strategic Plan on Intellectual Property...more
Outsourcing, whether technical or process-centric, has become an increasingly important component of businesses of all sizes. Handing over the complexity of ever-changing systems that require increasing expertise can often...more