Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
Maryland's Sales Tax on IT and Data Services
Sunday Book Review: July 20, 2025, The Best Books on Business Edition
(Podcast) The Briefing: Anthropic, Copyright, and the Fair Use Divide
The Briefing: Anthropic, Copyright, and the Fair Use Divide
SkadBytes Podcast | Tech’s Shifting Landscape: Five Trends Shaping the Conversation
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
The Authenticity Advantage: How Runbin Dong’s Scale Social AI Helps Small Businesses Shine
#Risk New York Speaker Series – Bridging the Gap: Effective Risk Communication in Compliance with Rob Clark, Jr.
Hsu Untied interview with Brad Waugh, General Counsel at TP-Link
Risk New York Speaker Series: AI Investments and Political Uncertainty with Chris Mason
#Risk New York Speaker Series: Exploring AI Risks in Compliance with Gwen Hassan
Unexpected Paths to IP Law with Dan Young and Colin White
Compliance Needs are Alive and Well: FTC's Recent Enforcement Activity
Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder
The LathamTECH Podcast — Getting Deals Done: Tackling Antitrust Challenges in Tech M&A
Compliance into the Weeds: Autonomous AI Whistleblowing Misconduct
Daily Compliance News: June 4, 2025, The Climate Disaster Management Edition
The Future of Supply Chains: Chris Andrassy on Using AI to Predict & Prevent Disruptions
Daily Compliance News: June 2, 2025, The Unintended Consequence Edition
Federal contractors, including defense contractors, should prepare for the emergence of new requirements in the coming months that are designed to strengthen software supply chain security, impose more stringent cybersecurity...more
In a win for policyholders, a federal court in Washington recently held that an insurer had a duty to defend a technology company against a vendor’s demand for damages it allegedly suffered when hackers accessed software...more
In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
Inside the Privacy Shield Annual Review - Dozens of senior US and EU government officials were joined by officials from data protection authorities in Austria, Bulgaria, France, Germany and Hungary to discuss whether the...more
The National Institute of Standards and Technology (NIST) recently circulated a draft white paper discussing recommended security practices to be adopted throughout the various phases of software development. The white paper...more
Cisco is warning customers using its Adaptive Security Appliance (ASA) software about a virtual private network (VPN) bug that could "allow an unauthenticated, remote attacker to cause a reload of the affected system or to...more