The LathamTECH Podcast — Turning a London Eye Toward International Tech Growth
AI Today in 5: August 7, 2025. The US v. China Episode
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 245: Using AI to Improve Radiology with Angela Adams of Inflo Health
AI Today in 5: August 5, 2025, The AI at the SEC Episode
Compliance Tip of the Day: AI, Whistleblowing and a Culture of Speak Up
Podcast - Regulating AI in Healthcare: The Road Ahead
AI and the False Claims Act
Innovation in Compliance: The Future of Compliance Training: AI, Adaptive, Learning, and Cultural
Compliance Tip of the Day: AI, Continuous Monitoring and Compliance
Key Discovery Points: Detecting AI is Difficult and Tricky!
Compliance Tip of the Day: AI and 3rd Party Risk Management
Compliance Tip of the Day: Bringing Predictive Analytics into Your Compliance Regime
(Podcast) The Briefing: The Wrong Argument – Why Authors Lost Against Meta and What Comes Next
The Briefing: The Wrong Argument – Why Authors Lost Against Meta and What Comes Next
Compliance and AI: Navigating Risk Management in the AI Era with Gaurav Kapoor
From OCR to AI The Future of Media and Image Analysis in eDiscovery
(Podcast) The Briefing: Anthropic, Copyright, and the Fair Use Divide
Hospice Insights Podcast - AI in Action: Exploring How AI Is Helping Hospices Do Things in New Ways
AI in eDiscovery Today: An Open Conversation
The Authenticity Advantage: How Runbin Dong’s Scale Social AI Helps Small Businesses Shine
SentinelOne researchers have discovered AkiraBot, which is used to target small- to medium-sized company websites with generative AI, and drafted outreach messages for website chats, comments, and contact forms. SentinelOne...more
AI-Powered: Corporate Strategies Versus Hacker Tactics - How can companies use artificial intelligence to respond more efficiently to threats, and what innovative attack methods are hackers developing with the help of AI?...more
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
Everyone thinks they can spot a phishing email. If true, we would not see so many security incidents, data breaches, and ransomware attacks. The statistics are overwhelming that phishing emails are a significant cause of data...more
I always watch what the federal government requires of its employees’ use of technology to get a feel for risks and what is coming down the pike from a regulatory standpoint—this has been going on for years. That’s why I was...more
MIT Report Details New Cybersecurity Risks - “Cloud misconfigurations, more sophisticated ransomware, and vendor exploitation attacks are contributing to rising cyberattacks.” Why this is important: Worldwide spending...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
CYBERSECURITY - Patch Adobe ColdFusion Vulnerabilities Being Exploited in the Wild ASAP - Adobe has issued alerts on three vulnerabilities affecting its ColdFusion product. The first alert, issued on July 11, 2023,...more
ChatGPT is amazing! It is all the rave. Its capabilities are awe-inspiring (except to educators who are concerned their students will never write a term paper again). It has reportedly passed a bar exam and a physician board...more