AI and the False Claims Act
Disparate Impact & Enforcement Rollbacks: What’s the Tea in L&E?
What’s in Your Operating Agreement? Legal Tips for Healthcare Providers
A New Brand of Uncertainty? — PE Pathways Podcast
The Rise of OTAs in Defense Contracting: Opportunities, Risks, and What Contractors Need to Know
Breaking the Cycle: Flooding, Infrastructure, and Climate Law in Practice
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
Understanding BBB Ratings: Building Trust and Mitigating Risks — Regulatory Oversight Podcast
Beyond the Bylaws: The Medical Staff Show - Need to Know: How to Manage Medical Staff Confidentiality and Privilege Protections
False Claims Act Insights - The Mathematics of Nuclear FCA Verdicts
PODCAST: Williams Mullen's Benefits Companion - Cost, Care and Captives: A Mid-Size Employer’s Guide to Benefit Trends
Lawyers Beware: There Could Be Serious Ethics Issues With The New AI Browsers
Avoiding a Bored Board
We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
LathamTECH in Focus: Tech Deals: The Emerging Focus of FDI Regulators?
Podcast - Tips for Maintaining FTC Compliance When Using AI
Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
The Presumption of Innocence Podcast: Episode 66 - Tariff Uncertainty and Compliance Risks for Businesses
Daily Compliance News: July 22, 2025, The I-9 Hell Edition
On June 6, a new Executive Order (EO) on cybersecurity altered the compliance landscape for federal contractors. The order pauses the imminent requirement for software vendors to formally attest compliance with the Secure...more
This is a continuation of the article, Panel of Experts for Everyone About Anything – Part One. Here in Part Two we give a demonstration of the software described in Part One. In the process we learn about new job types...more
Google recently issued its June Android Security Bulletin that is designed to patch 34 vulnerabilities, all of which Google designates as high-severity defects. The most serious flaw the patch is designed to fix in the...more
On this episode, we sit down with Mariana Padilla, CEO and co-founder of HACKERverse.ai — an AI-driven platform transforming how cybersecurity solutions are tested and purchased. From her early days in education and...more
SAP Netweaver Visual Composer users are urged to patch a critical vulnerability that attackers are actively exploiting. According to ReliaQuest, which detected the vulnerability, the attacks allow full system compromise...more
WhatsApp users should update the application for vulnerability CVE-2025-30401, which Meta recently patched when WhatsApp was released for Windows version 2.2450.6....more
On March 28, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a Malware Analysis Report (MAR) on RESURGE malware, which is associated with the product Ivanti Connect Secure....more
With the warranty industry evolving in the U.S., companies seeking to modernize conventional warranties by leveraging advanced technologies such as artificial intelligence (AI) are faced with unique regulatory questions and...more
I have practiced law for 40 years with the vast majority as a “construction” lawyer. I have seen great… and bad… construction lawyering, both when representing a party and when serving over 300 times as a mediator or...more
Investment in artificial intelligence (AI) is rising fast. The International Data Corporation projects global spending on AI R&D will reach $632 billion by 2028, more than twice the expected total for 2024....more
The deadline is fast approaching for in-scope financial entities and their ICT service providers to conform to the EU’s new digital operational resilience regulation. With effect from 17 January 2025, a broad range of EU...more
Upgrading critical applications has become a common challenge for corporate IT departments. Software vendors can deploy major releases more quickly because of improvements in coding and testing tools and some tie eligibility...more
In most merger and acquisition (M&A) transactions, the pace of the transaction, focus on the operational and financial performance of the target, and the competition created by multiple potential buyers make it a challenge to...more
The Federal Trade Commission (FTC) recently warned private entities to remediate any ongoing Log4j vulnerabilities present within their networks or face possible enforcement action....more
The National Institute of Standards and Technology (“NIST”) is seeking comments on its second draft of NIST SP 800-161 Rev. 1, “Cyber Supply Chain Risk Management Practices for Systems and Organizations,” published on October...more
Here’s why an optimized IT support capability can maximize reliability and efficiency for your ETRM system. ...more
Here’s how the SAP Community can mitigate the risk of a widespread cybersecurity incident involving their SAP systems....more
Is your ETRM system leaving you exposed to cybersecurity threats?...more
How is the new generation of policy automation management solutions changing the game and solving policy management’s thorniest problems? ...more