LathamTECH in Focus: Tech Deals: The Emerging Focus of FDI Regulators?
LathamTECH in Focus: Navigating National Security: The Impact of FDI Reviews on Tech M&A
Podcast - Navigating the Updated SF-328 Form
Compliance into the Weeds: Changes in FCPA Enforcement
Episode 372 -- DOJ Applies False Claims Act to Tariff and Trade Violations
Foreign Correspondent Podcast | The America First Investment Policy and What it Means for Investors
Podcast - A Comparative Guide to Obtaining an FCL: DCSA vs. the Intelligence Community
CHPS Podcast Episode 4: Tariffs and Trade Impact
Regulatory Ramblings: Episode 70 – Lessons for Compliance from a Law Enforcement Career + Regional Geopolitical Risks in 2025 with Mark Nuttall and Steve Vickers
SBR-Author’s Podcast: The Unseen Life of an Undercover Agent: A Conversation with Charlie Spillers
Daily Compliance News: May 21, 2025, The I Want You Back Edition
All Things Investigations: Task Force Strategies - Addressing New Government Priorities
Wiley's 2025 Key Trade Developments Series: CFIUS Review and Outbound Investments
Compliance Tip of the Day: Standing at the Turning Point
Regulatory Ramblings: Episode 68 - Why Geopolitical Risk Matters to Compliance and Legal Staff with Mark Nuttal and Chad Olsen
Episode 366 -- DOJ Issues Data Security Program Requirements
CHPS Podcast Episode 3: Unlocking America's Mineral Potential
No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
Sunday Book Review: April 13, 2025, The Books on Trade and Tariffs Edition
The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more
Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more
As NATO’s strategic priorities evolve, the accession of Finland and Sweden marks a significant shift in the alliance’s defense landscape. With these Nordic nations integrating into NATO’s security framework, their defense...more
North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more
At the recent Artificial Intelligence Action Summit in Paris, France, on February 10-11, 2025, U.S. Vice President JD Vance emphasized America’s commitment to AI leadership and to avoiding excessive regulation of AI. The...more
On December 27, 2024, the US Department of Justice (DOJ) issued a final rule establishing a new national security program to prevent access to Americans’ bulk sensitive personal data and government-related data by China...more
The Department of Justice (DOJ) has proposed a significant restriction on cross-border transfers of sensitive personal data to designated “countries of concern.” The goal is to address national security risks posed by...more
The deadline for EU countries to transpose the expanded cybersecurity directive, NIS 2, into national law is 17 October 2024, but the implementation status varies significantly from country to country. Some of the member...more
Just over a year ago, the White House issued its long-awaited National Cybersecurity Strategy, with an emphasis on defending Critical Infrastructure, promoting public and private collaboration, and safeguarding...more
On February 28, 2024, President Biden signed Executive Order (EO) 14117 titled “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern.” On March 5,...more
In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more
On May 24, 2023, Microsoft announced the detection of a direct threat to critical infrastructure organizations in Guam and elsewhere in the United States. The alert attributed observed malicious activity to a state-sponsored...more
On October 30, 2023, President Biden signed the 53-page Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence that significantly advances the United States' policy framework...more
On September 27, 2023, The U.S. National Security Agency (NSA), the U.S. Federal Bureau of Investigation (FBI), the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Japanese National Police Agency (NPA), and...more
Not only is the People’s Republic of China (PRC) a threat with its use of TikTok, but it also supports threat actors that have for years attacked U.S. based companies as well as the governments of the U.S. and Japan....more
Cybersecurity attacks on health care systems continue to pose a threat to national security and to patient safety. In the webinar Cybersecurity Best Practices in Health Care presented by Clark Hill attorneys John Howard and...more
Two months ago, the White House released its National Cybersecurity Strategy. Since then, various government agencies have issued new cybersecurity guidance for certain critical infrastructure subsectors. For example, the...more
In this month’s Privacy & Cybersecurity Update, we examine Iowa’s new data privacy law (the sixth state to enact a privacy law), the Biden administration’s new national cybersecurity strategy, the U.K. government’s revised...more
Editor’s Note: On January 18, 2023, HaystackID shared an educational webcast on China’s emerging statutes and regulations governing the processing, disclosure, and transfer of data. As Chinese entities increasingly become...more
In the waning days of 2022 and the 117th Congress, President Biden signed H.R.7535, the Quantum Computing Cybersecurity Preparedness Act, into law. The law recognizes the future threat that quantum decryption poses to federal...more
CYBERSECURITY - South Dakota Governor Bans State Workers from Using TikTok - It is estimated that some 80 million Americans and more than one billion people use TikTok. It is well known that TikTok has a direct...more
California Privacy Protection Agency Releases Revised Regulations - With the effective date less than three months away, and ahead of a Board Meeting on October 28 and 29, the California Privacy Protection Agency released...more
On October 5, 2022, the Department of Defense (DOD), in compliance with Section 889 of the National Defense Authorization Act for Fiscal Year 2019, released an updated list (Blacklist) of banned People’s Republic of China...more
Editor’s Note: On July 27, 2022, HaystackID shared an educational webcast on the topic of Committee on Foreign Investment in the United States (CFIUS) compliance. CFIUS is a U.S. government interagency committee with the...more
On July 20, 2022, the House Committee on Energy and Commerce advanced a new federal privacy bill titled the American Data Privacy and Protection Act (ADPPA) to the House floor. Although it is not yet law, many commentators...more