Podcast - A Comparative Guide to Obtaining an FCL: DCSA vs. the Intelligence Community
CHPS Podcast Episode 4: Tariffs and Trade Impact
SBR-Author’s Podcast: The Unseen Life of an Undercover Agent: A Conversation with Charlie Spillers
Daily Compliance News: May 21, 2025, The I Want You Back Edition
All Things Investigations: Task Force Strategies - Addressing New Government Priorities
Wiley's 2025 Key Trade Developments Series: CFIUS Review and Outbound Investments
Compliance Tip of the Day: Standing at the Turning Point
Regulatory Ramblings: Episode 68 - Why Geopolitical Risk Matters to Compliance and Legal Staff with Mark Nuttal and Chad Olsen
Episode 366 -- DOJ Issues Data Security Program Requirements
CHPS Podcast Episode 3: Unlocking America's Mineral Potential
No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
Sunday Book Review: April 13, 2025, The Books on Trade and Tariffs Edition
Podcast - The "I" in FOCI and AI: Innovation, Intelligence, Influence
Podcast - What Are Joint Ventures and When Should They Get Cleared?
FINCast Ep. 40 – 21st Century Financial Warfare: Technology, Economy, & National Security
All Things Investigations: Terrorism Designations of Mexican Cartels Fundamentally Enhances Risk for All Companies
Podcast - Reflecting on Careers in National Security Law
The Presumption of Innocence Podcast: Episode 54 - The Flaws of FARA: Feeble Oversight of Billions in Foreign Influence
Podcast - Navigating Regulatory Challenges in M&A Transactions
Foreign Correspondent: An FDI Podcast | Mapping the National Security Landscape for Investors
The rise of artificial intelligence has brought both opportunities and challenges to the workplace. However, a growing trend of employees using free or unauthorized AI tools poses significant risks, from security breaches to...more
While the US federal government is largely scaling back its rulemaking and compliance efforts, one critical exception is where personal data and technology intersect with national security. Exemplifying this trend, on April...more
On April 8, the National Security Division of the U.S. Department of Justice’s (DOJ) new rule on cross-border data transfers takes effect. It restricts U.S. businesses from transferring certain bulk sensitive personal data to...more
Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more
During the 2025 Chinese New Year, DeepSeek, a Chinese artificial intelligence (“AI”) model, garnered intense global attention and sparked heated discussions. It surpassed ChatGPT, which had been in the spotlight previously,...more
North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more
New York, Texas, and Virginia are the first states to ban DeepSeek, the Chinese-owned generative artificial intelligence (AI) application, on state-owned devices and networks....more
As noted , the renewable energy sector faces growing concerns over its vulnerability to cyberattacks. Since then, the situation has not improved; the U.S. electrical grid has grown more vulnerable to cyberattacks, with...more
On January 13, 2025, the Department of Commerce’s Bureau of Industry and Security (BIS) published an Interim Final Rule (IFR) that expands controls on advanced computing integrated circuits (ICs or chips) and model weights...more
On December 27, 2024, the US Department of Justice (DOJ) issued a final rule establishing a new national security program to prevent access to Americans’ bulk sensitive personal data and government-related data by China...more
Overall, the Report recognized the complex interplay between AI advancement and privacy/security concerns, advocating for a balanced approach that promotes innovation while protecting individual rights and national interests....more
Change Healthcare Inc. has amended its initial breach report to the HHS Office for Civil Rights (OCR) to state that 100 million individuals were impacted by its mammoth ransomware attack and breach. However, as of Oct. 24,...more
The deadline for EU countries to transpose the expanded cybersecurity directive, NIS 2, into national law is 17 October 2024, but the implementation status varies significantly from country to country. Some of the member...more
On June 21, 2024, the US Department of the Treasury (Treasury) released proposed new federal regulations (Proposed Rules) that, if implemented, would prohibit or require notification of a broad range of outbound investment...more
The technology industry is squarely under Congress’s spotlight these days. Rapid advances in artificial intelligence (AI), electric vehicles, and green energy, as well as concerns over data security and privacy, foreign...more
Just over a year ago, the White House issued its long-awaited National Cybersecurity Strategy, with an emphasis on defending Critical Infrastructure, promoting public and private collaboration, and safeguarding...more
On February 28, 2024, President Biden signed Executive Order (EO) 14117 titled “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern.” On March 5,...more
In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more
M&A activity in 2023 was subdued, as dealmakers grappled with geopolitical tensions, inflation, rising interest rates, and increasing regulatory scrutiny, against a backdrop of general economic uncertainty. Challenges in the...more
On May 24, 2023, Microsoft announced the detection of a direct threat to critical infrastructure organizations in Guam and elsewhere in the United States. The alert attributed observed malicious activity to a state-sponsored...more
On October 30, 2023, the Biden administration released a far-reaching executive order (EO) on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (AI). The EO issues directives related to the use...more
On October 30, 2023, President Biden signed the 53-page Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence that significantly advances the United States' policy framework...more
On October 30, the U.S. government released its long-awaited, sweeping executive order (the AI EO or Order) on artificial intelligence (AI). The Order directs various U.S. government departments and agencies to evaluate AI...more
Welcome to this week's issue of AI: The Washington Report, a joint undertaking of Mintz and its government affairs affiliate, ML Strategies. The accelerating advances in artificial intelligence (“AI”) and the practical,...more
Not only is the People’s Republic of China (PRC) a threat with its use of TikTok, but it also supports threat actors that have for years attacked U.S. based companies as well as the governments of the U.S. and Japan....more