Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
On Demand, On Purpose: Fashion Manufacturing That Doesn’t Cost the Earth
Compliance Tip of the Day: AI and 3rd Party Risk Management
All Things Investigations – Navigating Secondary Tariffs with Mike Huneke and Brent Carlson
FCPA Compliance Report: The Impact of Secondary Tariffs on Global Trade with Mike Huneke and Brent Carlson
Episode 377 -- Refocusing Due Diligence on Cartels and TCOs
GILTI Conscience Podcast | Beyond the Runway: Navigating Tax, Tariffs and Transfer Pricing in Luxury Fashion
How International Companies Can Prepare for July 9 Tariffs
Hot Topics in International Trade - Let's Be Serious-Supply Chain Audits
The Future of Supply Chains: Chris Andrassy on Using AI to Predict & Prevent Disruptions
Hot Topics in International Trade - Tariff Mitigation Strategies
A Voltage Voyage With Danielle Spalding, Cirba Solutions — Battery + Storage Podcast
Compliance in the Former Soviet Central Asian Republics
Tariffs and Trade Series: What Boards of Directors Need to Know
Episode 369 -- Stepping Into the Enforcement Spotlight -- Customs and Border Patrol and Import Enforcement
Tariffs and Trade Series: What Investors Need to Know
Compliance Tip of the Day: Using Supply Chain to Innovate in Compliance
Tariffs and Trade Series: What Senior Management Teams Need to Know
Wiley's 2025 Key Trade Developments Series: Trade Remedies
Understanding Human Trafficking and Modern Slavery: A Business Imperative with Clint Palermo
The One Big Beautiful Bill Act (“OBBBA”) (Publ. Law 119-21), enacted in July 2025, is a sweeping piece of legislation that addresses many issues. Among them, it allocates $1 billion over four years to boost U.S. offensive...more
The Cybersecurity and Infrastructure Security Agency (CISA) has agreed to make public a report from 2022 about US telecommunications networks' flawed security practices which relate to the Salt Typhoon attacks experienced by...more
The cybercrime group known as Scattered Spider is at it again, according to Google’s Threat Intelligence Group. This criminal group is known to focus its cyber attacks on one sector at a time. Last spring, it was the retail...more
Generative artificial intelligence, once the subject of experimental labs and speculative fiction, is now a central force in digital transformation, and cybersecurity professionals are finding themselves on unfamiliar ground....more
As data breach litigation continues to increase, companies need to worry about a new point of vulnerability - overseas employees. Many large companies outsource customer services to India and other low-cost providers to take...more
The global M&A market is forever evolving, and nowhere is this truer than in beauty, which has recently seen a notable surge in growth and popularity. McKinsey forecasts global beauty sales to grow six percent annually until...more
The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more
As noted , the renewable energy sector faces growing concerns over its vulnerability to cyberattacks. Since then, the situation has not improved; the U.S. electrical grid has grown more vulnerable to cyberattacks, with...more
Supply chain disruption and persistent inflation remain critical issues in the global economy, with ongoing geopolitical tensions, the evolution of digital threats, and increasing emphasis on sustainability reshaping the...more
Data breach class actions are again on the rise, with a recent report by Lex Machina confirming what many cybersecurity practitioners have seen first-hand over the last two years. The findings also reaffirm longstanding best...more
“Protect your data! Breaches are on the rise!” These warnings seem to be everywhere – and rightfully so. Threat actors are sophisticated and new breach trends are constantly materializing. Awareness is no longer enough. It...more
In the hyper-connected era of smart manufacturing, accelerated by “Industry 4.0,” the manufacturing sector is undergoing a digital revolution. By leveraging technologies such as advanced automation, artificial intelligence,...more
Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more
The cybersecurity skills gap is a major challenge facing businesses and organizations today. The immense and well-publicized illicit gains generated by cyber attackers have drawn a steady stream of talent to feed the growing...more
The concept of “security by obscurity” is officially outdated. In recent years, cyber-attacks have become increasingly sophisticated, destructive, and indiscriminate. In today’s landscape, cyber threats can come from internal...more
Join Mitratech & Escrypt in this electrifying new webinar on strengthening cybersecurity maturity. As local and global automotive cybersecurity regulations, standards, and guidelines increase in complexity, organizations are...more
The construction industry has experienced an amazing evolution in recent years thanks to the rapid adoption of new technologies. While all of this new technology has the potential to make companies more productive and more...more
Cybersecurity has emerged as a tangible risk for transportation service providers over the course of the last year. Ransomware attacks on domestic industry and critical infrastructure, and tensions associated with the Russian...more
Fears of cybersecurity attacks are mounting in the wake of the Russian invasion of Ukraine. From the war itself, a number of malware variants have been created and are circulating on the internet....more
Companies continue to see headlines about cyberattacks, but manufacturing companies, specifically, have become more targeted in the last few years. In the most recent issue of The Illinois Manufacturer, Molly Arranz and Sofia...more
Where We Stand - This year kicks off against the backdrop of the security flaw found in Log4j, a system-logging code library widely used in applications and services across the Internet. In the aftermath of this crisis, a...more
Privacy In Focus®- In 2021, cyber gained prominence as a top business risk and national security concern with ransomware attacks wreaking havoc on business operations and critical infrastructure. Companies large and small,...more
The Canadian Institute’s 11th Annual Forum on U.S. Export & Re-Export Compliance for Canadian Operations will take place in Toronto on January 25–27! IN-PERSON and LIVESTREAM options available. Over the last decade, this...more
On October 28, 2021, a bipartisan group of U.S. Senators introduced the Food Security is National Security Act of 2021 (the “Act”). Among other things, the Act would require the Committee on Foreign Investment in the United...more
The Cybersecurity and Infrastructure Security Agency (CISA), an agency within the Department of Homeland Security, recently issued an Autonomous Ground Vehicle Security Guide (Guide). Because autonomous-vehicle (AV) pilot...more