No Password Required: From Heavy Metal to the Front Lines of Cyber Innovation
Daily Compliance News: August 20, 2025, The Boss is Back Edition
Daily Compliance News: August 19, 2025, The AI Winter Edition
10 For 10: Top Compliance Stories For the Week Ending August 16, 2025
AI Today in 5: August 15, 2025, The AI as Boss Episode
The LathamTECH Podcast — Turning a London Eye Toward International Tech Growth
Daily Compliance News: August 14, 2025 The End of Dial Up Edition
Daily Compliance News: August 13, 2025. The Bad App Store Ratings Edition
Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
AI Today in 5: August 7, 2025. The US v. China Episode
LathamTECH in Focus: Move Fast, Stay Compliant
Daily Compliance News: August 6, 2025, The Spanking Banks Edition
Daily Compliance News: August 1, 2025, The All AI Edition
Daily Compliance News: July 30, 2025, The Corruption Kill Business Edition
Innovation in Compliance: Scaling Compliance Programs: Insights from a Navy Veteran and Compliance Leader
Daily Compliance News: July 28, 2025, The Where is Grasshopper when you need him Edition
JONES DAY TALKS®: Real Assets Roundup Episode 2: A First Look at Data Centers: The Fourth Utility
LathamTECH in Focus: Tech Deals: The Emerging Focus of FDI Regulators?
LathamTECH in Focus: Navigating National Security: The Impact of FDI Reviews on Tech M&A
Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
The U.S. Department of Justice (DOJ) recently announced a coordinated, nationwide enforcement action countering the Democratic People’s Republic of Korea (DPRK or “North Korea”) government’s efforts to finance its regime...more
DORA (Digital Operational Resilience Act) is an EU regulation that sets rules for how financial entities manage ICT (Information and Communication Technology) risks. It covers areas like cyber resilience, incident reporting,...more
The European Union Agency for Cybersecurity (ENISA) has launched the European Vulnerability Database (EUVD), a tool designed to enhance digital security across the EU. The EUVD is available here....more
By one count, worldwide there were some 11,800 data centers in early 2024. Within that census are facilities so small that they fit in office building closets, while others are among the largest manmade structures on the...more
New York, Texas, and Virginia are the first states to ban DeepSeek, the Chinese-owned generative artificial intelligence (AI) application, on state-owned devices and networks....more
The Cybersecurity and Infrastructure Security Agency (CISA) unveiled new cyber performance goals aimed at addressing risks to software development and product design in the IT sector. Last week, the Cybersecurity and...more
The EU Cyber Resilience Act (CRA) entered into force on 10 December 2024. The CRA is the first legislation of its kind in the world that aims to enhance the cyber security of products or software with a digital component...more
Remote worker fraud is expected to continue to proliferate in 2025. Fully remote hiring and work, particularly in the technology sector, continues to pose unique business and legal risks for companies. Just in December 2024,...more
The Department of Commerce (Commerce) Office of Information and Communications Technology and Services (OICTS) has broad authority—born out of executive action during the first Trump administration—to identify and mitigate...more
Partner Janine Anthony Bowen sits down one-on-one with current Chief Information Officers in the new series, “Technology from the Top: AI, Data and the Future of Business with Today’s CIOs” to discuss how they are adjusting...more
...As the world grapples with the rapid advancement of artificial intelligence (AI) technologies, concerns about the potential risks and unintended consequences have understandably taken center stage. While some advocate for...more
Gone are the days where technological solutions were “nice to have” options to provide us with better access to resources and improved process efficiencies. Nowadays, technological solutions – and specifically those that...more
Kaiser Permanente is notifying 13.4 million current and former members that their personal information may have been compromised when it was transmitted to tech giants Google, Microsoft Bing and X (formerly Twitter) when...more
Updates to the Health Insurance Portability and Accountability Act Security Rule (“HIPAA Security Rule”) are planned for Spring 2024. New guidance from The Department of Health and Human Services (“HHS”) via a recently...more
If you need a little intellectual stimulation after hours of Thanksgiving turkey and football, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has just the thing — the new CISA Mitigation Guide for the...more
The Biden-Harris Administration announced issuance of an Executive Order (“EO”) on October 30, 2023 that directs various Executive Agencies to study and draft regulations to address concerns regarding Artificial Intelligence...more
Engaging third-party providers for technology transactions involves a certain level of cybersecurity risk. In fact, most companies have been through a third-party incident. In this episode, partners Justin Herring and Adam...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
Organizations developing or using generative AI tools should implement cross-functional governance frameworks to develop and continuously monitor their use of such tools. From the earliest stages of generative AI use,...more
Host and Troutman Pepper Partner Alan Poole joins in a conversation with Leland Sparks, data center expert and principle at LNS Solutions. In this discussion, Leland describes how gargantuan increases in computing power...more
As businesses strive to do more with less, they are turning to technologies that can provide comprehensive visibility and insights into their operations. XDR (eXtended Detection and Response) technology is a solution that...more
On September 15, 2022, the European Commission (EC) published a Proposal for a Cyber Resilience Act (CRA Proposal) that sets out new rules in the European Union (EU) for software and hardware products and their remote data...more
Cyber risks are increasing, and as a result, due diligence inquiries and valuations are increasingly focusing on the cybersecurity and privacy risks inherent in a business’s collection, use, retention and disposal of data. ...more
Companies continue to see headlines about cyberattacks, but manufacturing companies, specifically, have become more targeted in the last few years. In the most recent issue of The Illinois Manufacturer, Molly Arranz and Sofia...more
What: Cleared Defense Contractors (CDCs) are being actively targeted by Russian state-sponsored cyber activity, according to a Joint Cybersecurity Advisory from the Federal Bureau of Investigation (FBI), National Security...more