The Briefing: Publicity Rights and the Law – Using Real People in Your Work
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Who Owns AI Innovation? IP in the Age of Artificial Intelligence
Compliance Tip of the Day: Trust and Verify
Compliance into the Weeds: The Dark Side of AI in Employee Training
Compliance Tip of the Day: AI Assistant for Compliance
Innovation in Compliance: Gaurav Kapoor on Risk Management and the Role of AI in GRC
AI Today in 5: August 18, 2025, The AI Music Episode
Compliance Tip of the Day: Costs and Benefits of AI
12 O’Clock High, A Podcast on Business Leadership – Leadership in Cybersecurity and Privacy with Robert Meyers
AI Today in 5: August 15, 2025, The AI as Boss Episode
The LathamTECH Podcast — Turning a London Eye Toward International Tech Growth
AI Today in 5: August 12, 2025, The Creating Billionaires Episode
AI Today in 5: August 11, 2025, The ACHILLES Project Episode
AI Today in 5: August 7, 2025. The US v. China Episode
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 245: Using AI to Improve Radiology with Angela Adams of Inflo Health
AI Today in 5: August 5, 2025, The AI at the SEC Episode
Compliance Tip of the Day: AI, Whistleblowing and a Culture of Speak Up
Podcast - Regulating AI in Healthcare: The Road Ahead
AI and the False Claims Act
Innovation in Compliance: The Future of Compliance Training: AI, Adaptive, Learning, and Cultural
AI-Powered: Corporate Strategies Versus Hacker Tactics - How can companies use artificial intelligence to respond more efficiently to threats, and what innovative attack methods are hackers developing with the help of AI?...more
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
Everyone thinks they can spot a phishing email. If true, we would not see so many security incidents, data breaches, and ransomware attacks. The statistics are overwhelming that phishing emails are a significant cause of data...more
MIT Report Details New Cybersecurity Risks - “Cloud misconfigurations, more sophisticated ransomware, and vendor exploitation attacks are contributing to rising cyberattacks.” Why this is important: Worldwide spending...more
CYBERSECURITY - TechRadar's Cyber Predictions for 2024 are Spot On - Because technology develops so rapidly, and “trends” are fast and furious, it is always hard to predict what the big issues will be for the next...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
CYBERSECURITY - SEC Adopts New Cybersecurity Rules for Public Companies - In a 3-2 vote, the Securities and Exchange Commission (SEC) adopted new cybersecurity rules yesterday (July 26, 2023) applicable to public...more
CYBERSECURITY - Patch Adobe ColdFusion Vulnerabilities Being Exploited in the Wild ASAP - Adobe has issued alerts on three vulnerabilities affecting its ColdFusion product. The first alert, issued on July 11, 2023,...more
Every couple of months a new AI trend or rather hype captures the news headlines. Yesterday, it was image recognition. Today, we are discussing large language models (LLMs). Tomorrow, who knows. But let’s focus on today’s...more
Each new technology seems to offer creative tools for both criminals and law enforcement. Telegraphs and telephones spawned wire and phone fraud. The era of digital networking ushered in the age of hacking. Digital banking...more