No Password Required: From Heavy Metal to the Front Lines of Cyber Innovation
Daily Compliance News: August 20, 2025, The Boss is Back Edition
Daily Compliance News: August 19, 2025, The AI Winter Edition
10 For 10: Top Compliance Stories For the Week Ending August 16, 2025
AI Today in 5: August 15, 2025, The AI as Boss Episode
The LathamTECH Podcast — Turning a London Eye Toward International Tech Growth
Daily Compliance News: August 14, 2025 The End of Dial Up Edition
Daily Compliance News: August 13, 2025. The Bad App Store Ratings Edition
Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
AI Today in 5: August 7, 2025. The US v. China Episode
LathamTECH in Focus: Move Fast, Stay Compliant
Daily Compliance News: August 6, 2025, The Spanking Banks Edition
Daily Compliance News: August 1, 2025, The All AI Edition
Daily Compliance News: July 30, 2025, The Corruption Kill Business Edition
Innovation in Compliance: Scaling Compliance Programs: Insights from a Navy Veteran and Compliance Leader
Daily Compliance News: July 28, 2025, The Where is Grasshopper when you need him Edition
JONES DAY TALKS®: Real Assets Roundup Episode 2: A First Look at Data Centers: The Fourth Utility
LathamTECH in Focus: Tech Deals: The Emerging Focus of FDI Regulators?
LathamTECH in Focus: Navigating National Security: The Impact of FDI Reviews on Tech M&A
Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
M&A activity in the cybersecurity sector is on pace to exceed 2024 volume by 10% in 2025, with continued consolidation as larger firms acquire niche players to enhance capabilities or expand product offerings. The...more
The European Union Agency for Cybersecurity (ENISA) has launched the European Vulnerability Database (EUVD), a tool designed to enhance digital security across the EU. The EUVD is available here....more
On March 13, 2025, the Federal Communications Commission’s (“FCC”) Chairman Brendan Carr announced the creation of a Council on National Security (the “Council”) with Adam Chan serving as the Director. This new Council will...more
Gone are the days where technological solutions were “nice to have” options to provide us with better access to resources and improved process efficiencies. Nowadays, technological solutions – and specifically those that...more
Editor's Note: In a historic and bold move, the U.S. government has implemented unprecedented sanctions against the Intellexa Consortium and its key figures for their roles in deploying spyware that jeopardizes privacy and...more
BioPlus Specialty Pharmacy Faces Lawsuit Over Healthcare Data Breach - "Florida-based BioPlus Specialty Pharmacy allegedly failed to safeguard PII and notify patients of a healthcare data breach that impacted 350K, the...more
What: On November 16, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) released Federal Government Cybersecurity Incident and Vulnerability Playbooks as part of the Biden Administration’s efforts to improve...more
The Cybersecurity and Infrastructure Security Agency (CISA) issued a sweeping binding directive to federal agencies to patch hundreds of cybersecurity vulnerabilities that are considered major risks for cyber actors to cause...more
Report on Patient Privacy 21 no. 9 (September, 2021) - As ransomware attacks become epidemic and breaches get larger, the Biden administration is partnering with private industry to bolster security and education in an...more
How to ensure emerging technologies help rather than hurt your organization - Technology represents the classic double-edged sword for compliance and ethics professionals. When properly utilized, it can be a vital tool,...more
Megan Brown sits down with one of Wiley’s newest attorneys, Sam Kaplan, former Assistant Secretary for Cyber, Infrastructure, Risk and Resilience Policy at the U.S. Department of Homeland Security (DHS), to discuss the...more
In the eighth in a series of 12 Jones Day Presents: Blockchain videos, partner Jay Johnson provides examples of existential, ordinary, and human error threats to blockchains that may result in data privacy breaches and...more
Technology and the critical infrastructure that support our personal pursuits and business operations are ripe targets for cyberattacks. In particular, the electrical grid that transmits electricity from its point of...more
When it comes to cyberattack targets, many think of retailers and associated credit card transactions or customer information, or perhaps healthcare providers with their ever-increasing storage and transmission of electronic...more
On October 12, 2015, Nossaman and UC Irvine hosted a Cyber Symposium at the City Club in Los Angeles. The event included four panels of Nossaman lawyers, UCI professors, and private professionals who are experts in the areas...more