Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
Maryland's Sales Tax on IT and Data Services
Sunday Book Review: July 20, 2025, The Best Books on Business Edition
(Podcast) The Briefing: Anthropic, Copyright, and the Fair Use Divide
The Briefing: Anthropic, Copyright, and the Fair Use Divide
SkadBytes Podcast | Tech’s Shifting Landscape: Five Trends Shaping the Conversation
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
The Authenticity Advantage: How Runbin Dong’s Scale Social AI Helps Small Businesses Shine
#Risk New York Speaker Series – Bridging the Gap: Effective Risk Communication in Compliance with Rob Clark, Jr.
Hsu Untied interview with Brad Waugh, General Counsel at TP-Link
Risk New York Speaker Series: AI Investments and Political Uncertainty with Chris Mason
#Risk New York Speaker Series: Exploring AI Risks in Compliance with Gwen Hassan
Unexpected Paths to IP Law with Dan Young and Colin White
Compliance Needs are Alive and Well: FTC's Recent Enforcement Activity
Innovation in Compliance: The Critical Importance of Mobile Application Security: Insights from Subho Halder
The LathamTECH Podcast — Getting Deals Done: Tackling Antitrust Challenges in Tech M&A
Compliance into the Weeds: Autonomous AI Whistleblowing Misconduct
Daily Compliance News: June 4, 2025, The Climate Disaster Management Edition
The Future of Supply Chains: Chris Andrassy on Using AI to Predict & Prevent Disruptions
Daily Compliance News: June 2, 2025, The Unintended Consequence Edition
Femtech stands at an exciting inflection point. What was initially perceived as a niche category focused on period-tracking apps has evolved into a comprehensive ecosystem addressing women's health needs with individualized...more
The stakes are high for FemTech – as Benjamin Franklin noted: ‘it takes many good deeds to build a good reputation and only one bad one to lose it.’...more
In May, the Federal Trade Commission (“FTC”) proposed changes (the “Proposed Rule”) to the Health Breach Notification Rule (the “Rule”), which, among other items, emphasize that the Rule applies to mobile health applications...more