Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
Maryland's Sales Tax on IT and Data Services
Sunday Book Review: July 20, 2025, The Best Books on Business Edition
(Podcast) The Briefing: Anthropic, Copyright, and the Fair Use Divide
The Briefing: Anthropic, Copyright, and the Fair Use Divide
SkadBytes Podcast | Tech’s Shifting Landscape: Five Trends Shaping the Conversation
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
The Authenticity Advantage: How Runbin Dong’s Scale Social AI Helps Small Businesses Shine
#Risk New York Speaker Series – Bridging the Gap: Effective Risk Communication in Compliance with Rob Clark, Jr.
Hsu Untied interview with Brad Waugh, General Counsel at TP-Link
Risk New York Speaker Series: AI Investments and Political Uncertainty with Chris Mason
#Risk New York Speaker Series: Exploring AI Risks in Compliance with Gwen Hassan
Unexpected Paths to IP Law with Dan Young and Colin White
Compliance Needs are Alive and Well: FTC's Recent Enforcement Activity
Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder
The LathamTECH Podcast — Getting Deals Done: Tackling Antitrust Challenges in Tech M&A
Compliance into the Weeds: Autonomous AI Whistleblowing Misconduct
Daily Compliance News: June 4, 2025, The Climate Disaster Management Edition
The Future of Supply Chains: Chris Andrassy on Using AI to Predict & Prevent Disruptions
Daily Compliance News: June 2, 2025, The Unintended Consequence Edition
Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed. State Action: North Dakota Passes Law...more
On April 22, 2025, Laura D’Allaird, Chief of the SEC’s Cyber and Emerging Technologies Unit (CETU), participated in the Incident Response Forum Masterclass 2025 (Incident Response Masterclass). In the session, titled “SEC...more
Welcome to our fourth issue of 2025 of Decoded - our technology law insights e-newsletter. We hope you enjoy this issue and thank you for reading. Sector by Sector: How Data Breaches are Wrecking Bottom Lines - “Data...more
The Artificial Intelligence Act (AI Act) is the world's first comprehensive legal framework for AI regulation, which entered into force on August 1, 2024. The AI Act aims to ensure that AI systems are trustworthy, safe and...more
At what point has a director served too long? What about term limits? A mandatory retirement age? When do a director’s skills become stale? These issues are addressed in this issue of The Informed Board, as well as why proxy...more
As the holiday shopping season kicks into high gear, it also becomes a prime opportunity for cybercriminals to target retailers, their suppliers, and their customers. As The Hacker News reports, criminal use of artificial...more
Gone are the days where technological solutions were “nice to have” options to provide us with better access to resources and improved process efficiencies. Nowadays, technological solutions – and specifically those that...more
MIT Report Details New Cybersecurity Risks - “Cloud misconfigurations, more sophisticated ransomware, and vendor exploitation attacks are contributing to rising cyberattacks.” Why this is important: Worldwide spending...more
Editor's Note: In a significant study from MIT's CSAIL, researchers have unveiled vulnerabilities in smartphone ambient light sensors, highlighting them as potential channels for privacy breaches. This discovery underscores...more
ACI’s 8th Annual Legal, Regulatory, and Compliance Forum on Fintech & Emerging Payment Systems will provide in-depth guidance on the latest regulatory developments at the Federal and State Level that you need to be aware of....more
The Fiscal Year 2024 National Defense Authorization Act (“FY2024 NDAA”) continues the national security imperative to enhance the country’s scientific and technological developments and to adopt emerging technologies and...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
Machine learning (ML) models are a cornerstone of modern technology, allowing models to learn from and make predictions based on vast amounts of data. These models have become integral to various industries in an era of rapid...more
Cyber Resilience Programs Falling Short on Preparing Workers for a Crisis- “At two-thirds of organizations, there is a fear that almost all employees, 95%, will not understand how to recover following a cyberattack.” ...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
While Managed Detection and Response (MDR) takes advantage of the latest technology, it is important to recognize that humans are still the best at making the complex, nuanced decisions that are sometimes necessary in...more
TikTok Will Partner with Oracle in the United States After Microsoft Loses Bid - "TikTok and Oracle will become business partners in the United States — a deal meant to satisfy the Trump administration's national security...more