No Password Required: CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things
Investment Opportunities in Italy's Tech Market
The SaaS Tacks – The Ins and Outs of Negotiating SaaS Contracts
Law School Toolbox Podcast Episode 430: The Paxton AI Founders Talk About Their AI Legal Assistant
CMO Series EP100 - Celebrating 100 episodes and exploring the future of professional services marketing
Medical Device Legal News with Sam Bernstein: Episode 10
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Paralegal Insights: A Collaborative Trademark Practice, Series 3
JONES DAY PRESENTS®: Enhancing Trade Secret Protection in Remote Work Environments
Investigative Power: Utilizing Self Service Solutions for Internal Investigations?
Podcast: Unpacking FDA's Final Clinical Decision Support Guidance - Diagnosing Health Care
Software Escrow: An enterprise resiliency tool every legal department should have in their toolbox (with Don Dennis Jr.)
ASG LegalTech CEO Soumya Nettimi Talks Covid, Racial Injustice and The Future of Legal Payments: On Record PR
E8: Interview with Cookiebot CEO on Technical Solutions to GDPR Readiness
New Revenue Recognition Standard-Part III, Shaking Up the Software Industry?
Unfair and Unbalanced-Episode 19
FCPA Compliance Report-Episode 286-Use of Technology in Supply Chain Risk Management
Compiling Successful IP Solutions for Software Developers
Drafting Software Patents In A Post-Alice World
Polsinelli Podcasts - Hear How the SCOTUS Ruling May Impact Patent-Eligible Subject Matter for Software
IP|Trend: New Era in Protection of Software by Intellectual Property Law?
Google recently issued its June Android Security Bulletin that is designed to patch 34 vulnerabilities, all of which Google designates as high-severity defects. The most serious flaw the patch is designed to fix in the...more
You may have recently received a letter from a Texas law firm of Daniels and Trednick. This company has a strong presence in handling software piracy cases. GibbsCam is one of the products they enforce as far as intellectual...more
An iPhone Knows Your Significant Locations - Keep in mind that iPhones use a particular method to track the smartphone’s location known as ‘significant locations’. ...more
The risks associated with leveraging open source libraries, and the review needed, are increasing. In the first half of 2025, cybersecurity researchers observed a sharp rise in the incidence of malicious code embedded in...more
On 17 March 2025, the Australian Government published Model Clauses to help government purchasers manage vendor relationships when procuring AI technology based systems and services. The Model Clauses cover issues relevant to...more
The Federal Trade Commission (FTC) has agreed to accept the new administration's first settlement of a merger-enforcement challenge. The settlement includes the divestiture of three businesses and will allow Synopsys, Inc. to...more
Prema Engineering S.r.l. (“Prema Engineering”) has accused automaker Automobili Lamborghini S.p.A. and Automobili Lamborghini America, LLC (collectively, “Lamborghini”) of stealing Prema Engineering’s intellectual property...more
For the past decade, controversy regarding the laws of patent eligibility has created uncertainty in the minds of inventors and investors, especially in the biotechnology, medical diagnostics, and software industries adjacent...more
The European Union Agency for Cybersecurity (ENISA) has launched the European Vulnerability Database (EUVD), a tool designed to enhance digital security across the EU. The EUVD is available here....more
Never underestimate an operating system update from any mobile phone manufacturer. This week, Apple issued iOS 18.5 which provides enhancements to the user experience, but also fixes bugs and flaws....more
Programming is rapidly transforming from a manual, line-by-line exercise into an iterative collaboration between programmers and their large language model (LLM) of choice. Working inside modern integrated development...more
Contract Law is a foundational first year course in any law school. As fledgling lawyers everywhere know, when they come out of law school and prepare for the bar exam, contracts form a critical component of our global...more
According to Forbes, “in 2025, the landscape of enterprise resource planning (ERP) is set for a thrilling transformation,” with a shift toward cloud-native ERP solutions at the top of the list....more
On May 20th, Kilpatrick tax partner Jeff Reed presented during a New York City Bar SALT Committee meeting. Jeff discussed the recent NetVoyage New York Division of Tax Appeals sales tax determination....more
To help you stay on top of the latest news, our AI practice group has compiled a roundup of the developments we are following....more
The U.S. Attorney’s Office for the District of Massachusetts has charged a student at Assumption University with hacking into two U.S.-based companies’ systems and demanding a ransom....more
Sterne Kessler’s U.S. IP Update is a newsletter delivering the latest developments in U.S. intellectual property law, tailored for companies and legal counsel in Korea. Stay informed on key court decisions, policy changes,...more
A federal court has upheld the IRS’s right to use automated tools to review Employee Retention Credit (ERC) claims, rejecting a challenge brought by two tax preparation firms. In ERC Today LLC v. McInelly, the U.S. District...more
On April 30, 2025, the Federal Circuit issued a decision in Fintiv, Inc. v. PayPal Holdings, Inc. (No. 23-2312), issued on April 30, 2025, upholding the invalidation of Finitiv Inc.’s (“Finitiv”) mobile wallet patents related...more
Technology vendors everywhere want to serve big Wall Street banks, so when one of those banks talks about risks they see in their software supply chain, compliance and audit professionals should listen – which brings us to an...more
On April 18, 2025, the Court of Appeals for the Federal Circuit (CAFC) ruled in Recentive Analytics Inc. v. Fox Corp. et al. that new uses for established machine learning do not make the claims patent-eligible....more
Cyber security supply chain risks are growing, and attacks on vendors and other third parties cause severe disruption to businesses. For example, in recent years we have seen many incidents that have involved threat actors...more
Skills are the new currency! Is your company going broke? Discover how a powerful workforce development platform like Mitratech Trakstar helps future-proof your business by closing the skills gap, boosting employee...more
The EU Cyber Resilience Act (CRA), adopted by the European Parliament in 2024, marks a major milestone in European cybersecurity legislation. As the first EU-wide law focused on the cybersecurity of digital products, it...more