No Password Required: From Heavy Metal to the Front Lines of Cyber Innovation
Daily Compliance News: August 20, 2025, The Boss is Back Edition
Daily Compliance News: August 19, 2025, The AI Winter Edition
10 For 10: Top Compliance Stories For the Week Ending August 16, 2025
AI Today in 5: August 15, 2025, The AI as Boss Episode
The LathamTECH Podcast — Turning a London Eye Toward International Tech Growth
Daily Compliance News: August 14, 2025 The End of Dial Up Edition
Daily Compliance News: August 13, 2025. The Bad App Store Ratings Edition
Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
AI Today in 5: August 7, 2025. The US v. China Episode
LathamTECH in Focus: Move Fast, Stay Compliant
Daily Compliance News: August 6, 2025, The Spanking Banks Edition
Daily Compliance News: August 1, 2025, The All AI Edition
Daily Compliance News: July 30, 2025, The Corruption Kill Business Edition
Innovation in Compliance: Scaling Compliance Programs: Insights from a Navy Veteran and Compliance Leader
Daily Compliance News: July 28, 2025, The Where is Grasshopper when you need him Edition
JONES DAY TALKS®: Real Assets Roundup Episode 2: A First Look at Data Centers: The Fourth Utility
LathamTECH in Focus: Tech Deals: The Emerging Focus of FDI Regulators?
LathamTECH in Focus: Navigating National Security: The Impact of FDI Reviews on Tech M&A
Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more
The integration of artificial intelligence (AI) tools in healthcare is revolutionizing the industry, bringing efficiencies to the practice of medicine and benefits to patients. However, the negotiation of third-party AI tools...more
Accountability is a pervasive AI principle. But how to put it into practice? Accountability is a pervasive AI principle. But how to put it into practice? If you’re reading this note, you likely already know three things:...more
The White House has introduced the Cyber Trust Mark program, a voluntary labeling initiative to help consumers easily identify secure Internet of Things (IoT) devices....more
This year’s Data Privacy Week theme is “take control of your data.” That can be really challenging to do. Data is collected from everywhere—whether online or offline—and can be stored and used indefinitely (even if the...more
Welcome to our ninth 2024 issue of Decoded - our technology law insights e-newsletter. How are States Using Generative Artificial Intelligence? and Employee AI Adoption Cools Globally - Why this is important: As...more
As artificial intelligence (AI) continues to advance rapidly, organizations of all types are seeking to deploy this powerful tool to increase the effectiveness and efficiency of their operations, improve service to their...more
MIT Report Details New Cybersecurity Risks - “Cloud misconfigurations, more sophisticated ransomware, and vendor exploitation attacks are contributing to rising cyberattacks.” Why this is important: Worldwide spending...more
Artificial intelligence (AI) is expanding into more industries (often in surprising ways) and has inevitably caught the attention of federal and state regulators. Our Privacy, Cyber & Data Strategy Team summarizes the...more
On December 4, 2020 the President signed into law the IoT Cybersecurity Improvement Act of 2020, Pub. L. No. 116-207 (the “IoT Act”). The legislative purpose behind the new law is to ensure the highest level of cybersecurity...more
The Department of Defense (DOD) and its component services and agencies are taking several independent steps to assess and enhance their cyber and supply chain security that will directly or indirectly affect DOD contractors...more
Taking over as editors of Holland & Knight’s Government Contracts Blog has been a labor, but it has been a labor of love. Like the rest of the Government Contracts Team, we are passionate about staying on top of the latest...more
All organizations, including financial institutions, continue to face significant security threats across their wide ranging IT systems. Such organizations are particularly vulnerable if they cannot track networked devices...more