The Presumption of Innocence Podcast: Episode 68 - The Legacy and Lessons of Guantanamo Bay: A Defense Attorney’s Perspective
Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
AI Today in 5: August 7, 2025. The US v. China Episode
Great Women in Compliance: LATAM Compliance Update with Alejandra Montenegro Almonte
Compliance into the Weeds: A Deep Dive into Cadence Design Systems’ Export Control Violations
Under the Radar: DOJ's Data Security Rules and Their Impact on Payments Companies — Payments Pros – The Payments Law Podcast
Daily Compliance News: August 1, 2025, The All AI Edition
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
LathamTECH in Focus: Tech Deals: The Emerging Focus of FDI Regulators?
LathamTECH in Focus: Navigating National Security: The Impact of FDI Reviews on Tech M&A
Podcast - Navigating the Updated SF-328 Form
Compliance into the Weeds: Changes in FCPA Enforcement
Episode 372 -- DOJ Applies False Claims Act to Tariff and Trade Violations
Foreign Correspondent Podcast | The America First Investment Policy and What it Means for Investors
Podcast - A Comparative Guide to Obtaining an FCL: DCSA vs. the Intelligence Community
CHPS Podcast Episode 4: Tariffs and Trade Impact
Regulatory Ramblings: Episode 70 – Lessons for Compliance from a Law Enforcement Career + Regional Geopolitical Risks in 2025 with Mark Nuttall and Steve Vickers
SBR-Author’s Podcast: The Unseen Life of an Undercover Agent: A Conversation with Charlie Spillers
On June 30, 2025, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and the Department of Defense Cyber Crime Center (DC3) published a...more
Last week, the Trump administration made its priorities clear for the nation’s cybersecurity posture in the form of the newly issued executive order entitled “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity...more
The National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and cybersecurity agencies from Australia, New Zealand, and the...more
If you thought your company's collection of email address, IP address, zip code, birth date, or cookie data was too mundane to catch the federal government's attention – think again. Effective April 8, 2025, a new DOJ final...more
The guidelines specify the requirements for data controllers to conduct risk assessments related to the transfer or disclosure of personal data outside the Kingdom. ...more
North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more
The U.S. Department of Commerce's Bureau of Industry and Security (BIS) issued an Advance Notice of Proposed Rulemaking (ANPRM) on January 3, 2025, seeking public input to inform the potential development of a rule to secure...more
On October 16, China’s Ministry of State Security highlighted a case where a foreign company, in collaboration with a Chinese company, conducted illegal surveying and mapping within the territory of China under the guise of...more
Artificial intelligence (AI) is transforming industries at an unprecedented pace, but it also introduces complex compliance challenges. While many regions are ramping up their regulatory frameworks to address these risks,...more
As cybersecurity rules proliferate, companies must navigate a maze of new, and often overlapping, proactive and reactive cybersecurity requirements and guidance. This Legal Update surveys new cybersecurity rules and...more
On February 28, 2024, President Biden signed Executive Order (EO) 14117 titled “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern.” On March 5,...more
On May 24, 2023, Microsoft announced the detection of a direct threat to critical infrastructure organizations in Guam and elsewhere in the United States. The alert attributed observed malicious activity to a state-sponsored...more
• DoD and other government agencies will scrutinize contractors’ supply chain security plans and programs from proposal submission to contract closeout. • The 2019 NDAA as approved by Congress and DHS initiatives highlight...more
In its recent Cybersecurity Strategy, the U.S. Department of Homeland Security (DHS) defined “cyberspace” as “the independent network of information technology infrastructure, including the Internet, telecommunications...more