Compliance Tip of the Day: Why Engage in Pre-acquisition Due Diligence
Compliance Tip of the Day: Key M&A Enforcement Actions
Compliance Tip of the Day: M&A – International Issues
Daily Compliance News: August 5, 2025, The Staying Focused Edition
Compliance Tip of the Day: M&A Domestic Issues
10 For 10: Top Compliance Stories For the Week Ending, August 2, 2025
Adventures in Compliance: The Novels – The Hound of the Baskervilles: Uncovering M&A Compliance Lessons
Daily Compliance News: July 25, 2025, The New Sheriff in Town Edition
10 For 10: Top Compliance Stories For the Week Ending, July 26, 2025
Regulatory Ramblings: Episode 74 - Global Women in AI/Corporate Director Liability: Discretionary, Not Fiduciary with Tram Anh Nguyen and Marc I. Steinberg
We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
Daily Compliance News: July 24, 2025, The In Phone Hell Edition
LathamTECH in Focus: Tech Deals: The Emerging Focus of FDI Regulators?
LathamTECH in Focus: Navigating National Security: The Impact of FDI Reviews on Tech M&A
Navigating Employee Integration in Mergers and Acquisitions: Lessons From Pretty Woman — Hiring to Firing Podcast
Treating Compliance Like an Asset
Episode 376 -- DOJ's Unicat Settlement and the Future Look of Trade Enforcement Actions
First 100 Days of the New HSR Rules with Antitrust Partner Kara Kuritz
Daily Compliance News: June 23, 2025, The Is Walmart Cool Edition
Expert or Arbitrator? — PE Pathways Podcast
A recent Department of Justice (“DOJ”) settlement highlights the importance of assessing cybersecurity compliance for government contractors during mergers and acquisitions (“M&A”). In April 2025, DOJ announced an $8.4...more
The U.S. Department of Defense (DOD) has long questioned whether contractors and their supply chains have been fully compliant with existing cybersecurity requirements aimed at protecting Controlled Unclassified Information...more
When prospective buyers conduct legal due diligence in merger and acquisition transactions the main focus is typically on the traditional items, such as financials, debt instruments, major contracts and other key metrics...more
Throughout the past several years, data privacy and security practices have evolved into more than just defending against identity theft and protecting sensitive data. In fact, since 2014, to help raise awareness for data...more