AI Today in 5: August 6, 2025, The Rethinking Compliance Episode
AI Today in 5: August 5, 2025, The AI at the SEC Episode
FCPA Compliance Report: Navigating Corporate Scandals: Insights on Governance, Compliance, and Recovery with Steve Vincze
Podcast - Regulating AI in Healthcare: The Road Ahead
Life With GDPR: Episode 114: Navigating GDPR in Global Outsourcing with Inge Zwick
Daily Compliance News: June 27, 2025, The ABB Gets Out of DPA Edition
Regulatory Ramblings: Episode 72 - Cultural Roots, Belonging, and the Fear of Change: What’s Next for Inclusion?
(Podcast) The Briefing: The Ninth Circuit Puts the Brakes on Eleanor’s Copyright Claim
Compliance Tip of the Day: AI, Behavioral Analytics and Cyber Security
Performance Reviews: Lessons from Severance — Hiring to Firing Podcast
FCPA Compliance Report: Recent DOJ Policy Announcements
Culture Crafters: Navigating Business Volatility Through Corporate Culture
Upping Your Game: Harnessing AI to Revolutionize Third-Party Risk Management
Compliance and AI: Using AI for Data Loss Prevention Systems with Vinay Goel
The JustPod: Prosecutor-Initiated Resentencing: A Discussion with Hillary Blout
CareYaya: A Revolutionary Approach to Elder Care
Independent Contractor Rule, EEO-1 Reporting, and New York Labor Law Amendment - #WorkforceWednesday® - Employment Law This Week®
Podcast - Betty... embargaron Ecomoda
Sunday Book Review: May 11, 2025, The Celebrating Texas Writer’s Month Edition
Compliance and AI: Navigating Regulatory Challenges in 2025 with Allison Lagosh
Digital Asset Companies Announce New Partnerships, Acquisitions, Products - A recent press release announced that Ripple, a U.S. fintech and digital asset infrastructure provider, has agreed to acquire Hidden Road, a prime...more
As we prepare to close the books on another eventful year in the cyber and privacy space, Wiley’s cyber insurance team is already making predictions for 2025. Q: So, let’s get right into it – based on your experience this...more
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
Cybercriminals continue to outpace the best efforts of regulators, law enforcement, and cybersecurity professionals. Recent reporting from the Federal Bureau of Investigation demonstrates that cybercriminals are increasingly...more
EigenLayer TVL Surpasses $20B; New Self-Custodial Wallet Features Launch - According to recent reports, the total value locked (TVL) on the Ethereum network-based EigenLayer restaking protocol recently surpassed $20...more
Although artificial intelligence (“AI”) improves how businesses interact with customers, process sales, manage inventory and more, it also heralds new and unique cybersecurity risks. These risks can lead to unprecedented...more
Most everyone in the AI and legal worlds by now knows about the New York Times (“NYT”) suit against Microsoft and various Open AI entities (“OAI”). The NYT alleges copyright infringement by the practice of OAI, and most all...more
From large-scale hacks to new rules governing cyber practices, the cyber landscape continues to become more complex. The risk for breaches is higher than ever before. The numbers support this declaration. According to the...more
In 2024, businesses will continue to face an evolving landscape of cyber threats, along with an increasingly complex regulatory environment. With heightened scrutiny from regulators, consumers, and investors, the need to...more
The Most Significant Developments in Cybersecurity and Cyber-Related Liability Risks - As we reflect upon 2023, it will unfortunately be remembered as a record-breaking year for ransomware and cybercrime....more
CYBERSECURITY - Hackers Steal $4.4M Crypto Using Data Linked to LastPass Breach - According to Bleeping Computer, crypto fraud researchers at ZachXBT, and MetaMask developer Taylor Monahan have reported that on October 25,...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
The annual Cost of a Data Breach Report (Report) published by IBM is reliably full of helpful cybersecurity data. This year is no different. After reviewing the Report, we pulled out some interesting data points. Of course,...more
Hackers responded to the White House call by the thousands, including reporter-AI-hacker Ralph Losey, to try to break existing software in open contests. Ralph joined in the AI hack attack, but there were many other...more
Publications and Advisories - July 31, 2023 – Dave Brown, Kate Hanniford, Kim Peretti, Julia Mediamolle, Cara Peterman, Sierra Shear, Kristen Bartolotta, and Kezia Osunsade published “Securities Law, Securities Litigation,...more
Since the public release of OpenAI’s ChatGPT in November 2022, the internet has exploded with content on the pros and cons of the use of artificial intelligence (AI). For business owners, the primary discussions revolve...more
Ransomware has become a major threat to businesses across the world as cyber-attacks are becoming increasingly sophisticated, resulting in devastating financial damage for companies that fall victim. Not only are important...more
CYBERSECURITY - CISA Lists Top CVEs Exploited by Chinese State-Sponsored Cyber Actors - The Cybersecurity & Infrastructure Security Agency (CISA) recently issued an Alert outlining the top Common Vulnerabilities and...more
Technology has brought efficiency into the workplace, but not without legal risk. Employers are increasingly tasking technology to assist with human resource functions, security, and workplace monitoring, all of which can...more
CYBERSECURITY - CISA + MS-ISAC Alert: Threat Actors Exploiting Zimbra Collaboration Suite - On August 16, 2022, CISA (the Cybersecurity and Infrastructure Security Agency) and the Multi-State Information Sharing & Analysis...more
CYBERSECURITY - Twilio Hit with Social Engineering Smishing Scheme - We’ve explained smishing schemes before. Smishing is like phishing, but uses SMS texting to deliver malicious code to users’ phones, or tricks the user...more
Takeaway: Companies need to be vigilant about feeding their machines clean data to avoid hackers poisoning their networks. Artificial intelligence is everywhere: from facial recognition technology to weather forecasting. ...more
CYBERSECURITY - CISA/FBI Advisory Warns of Destructive Malware Used Against Ukraine - The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued a joint advisory this week alerting organizations of...more
The technology sector runs the gamut from artificial intelligence (AI), the Internet of Things (IoT) to SaaS companies or cybersecurity, and from the biggest household names to the smallest companies being operated out of...more