Compliance Tip of the Day: AI, Continuous Monitoring and Compliance
Money-Saving Licensing Tips for Startups
Just Press "Play"
Lawyers Beware: There Could Be Serious Ethics Issues With The New AI Browsers
Project Catalyst an Economic Development Video Podcast | Episode 16: Powering Alabama’s Economic Progress with Leigh Davis of Alabama Power Company
LathamTECH in Focus: Navigating National Security: The Impact of FDI Reviews on Tech M&A
Podcast - Ejecución de facturas electrónicas
Julie Mortimer of Mills & Reeve on The Right Way to Kickstart Your CRM Strategy - Passle's CMO Series Podcast EP176
Sunday Book Review: July 20, 2025, The Best Books on Business Edition
Hospice Insights Podcast - AI in Action: Exploring How AI Is Helping Hospices Do Things in New Ways
Empowerment Through Hero Generation with Nicole a`Beckett and Dr. Shruti Roy
How to Rank in the Age of AI Search: On Record PR
SBR-Authors Podcast: A Journey Through Memoir, Technology, and Grief with Tony Stewart
Episode 373 -- Christian Focacci on Current Developments in AI and Risk Management
Law School Toolbox Podcast Episode 507: What Do I Need to Do Before the First Day of Law School? (1L Summer Series)
Meet Phil Leslie, Cornerstone Research's New Chief Technology and Innovation Officer
London Partner Roberta Downey Wired for Disputes: Tech, Infrastructure, and the New Frontier of Risk
Law School Toolbox Podcast Episode 505: Breaking ADHD Barriers with the Help of AI (w/Lindsay Scola)
No Password Required: CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things
(Podcast) The Briefing: No CTRL-ALT-DEL For the Server Test
On July 23, 2025, the Trump Administration issued a 28-page action plan (the Action Plan or the Plan) and three corresponding Executive Orders designed to “win the AI race” and achieve “global dominance” in the AI...more
In an era when data is everything, everywhere, all at once and computation has almost no limit, ensuring privacy while leveraging data analytics is paramount. The US Department of Commerce’s National Institute of Standards...more
Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed. State Action: Texas Limits Punitive Damage Liability For Data Security Breach...more
On June 6, a new Executive Order (EO) on cybersecurity altered the compliance landscape for federal contractors. The order pauses the imminent requirement for software vendors to formally attest compliance with the Secure...more
On June 6, 2025, the Trump Administration issued a new Executive Order, Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144 (the EO) that contains...more
Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed. State Action: Virginia Governor Signs Bill Restricting Minor’s Use of Social Media:...more
Encryption is one of several cornerstones of a robust information security program. Articles on quantum computing often include the compelling narrative that encryption is at risk, but as with any revolutionary technology,...more
The Biden administration issued a widely anticipated executive order on artificial intelligence (“AI”) earlier this week. The Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence...more
On July 13, 2023, the Federal Communications Commission (FCC or Commission) released a Draft Notice of Inquiry (Draft NOI or Draft) that would seek input on leveraging new technologies to collect and analyze data on...more
Following the release of President Biden’s National Cybersecurity Strategy, Acting National Cyber Director Kemba Walden explained that the Biden Administration is “expecting more” from owners and operators in critical...more
In the waning days of 2022 and the 117th Congress, President Biden signed H.R.7535, the Quantum Computing Cybersecurity Preparedness Act, into law. The law recognizes the future threat that quantum decryption poses to federal...more
The National Institute of Standards and Technology (“NIST”) is seeking comments on its second draft of NIST SP 800-161 Rev. 1, “Cyber Supply Chain Risk Management Practices for Systems and Organizations,” published on October...more
The past two decades have produced intense focus on information security to protect data. This priority remains important. But the change in administrations and the Continental Pipeline incident have redirected attention...more
The National Institute of Standards and Technology (“NIST”) is seeking comments on its draft NIST SP 800-161 Rev. 1, “Cyber Supply Chain Risk Management Practices for Systems and Organizations,” published on April 29, 2021....more
The National Institute of Standards and Technology, commonly referred to as NIST, recently published a new computer framework for users to consider as a cyber-framework security model — the Zero Trust Architecture Model...more
On May 12, 2021, the Biden Administration issued its much anticipated “Executive Order on Improving the Nation’s Cybersecurity.” Below are provisions we believe will be of most interest to contractors, as well as any company...more
What kinds of cloud computing transactions take place in your jurisdiction? As a G7 economy with mature IT and related services markets, the UK is one of the most important global markets for cloud computing. According to...more
On January 12, 2017, prior to the new administration taking power, the National Telecommunications and Information Administration (NTIA) within the Department of Commerce (Department) released a Green Paper on “Fostering the...more
We consistently comment about the importance of educating the next generation of students on cybersecurity. The earlier the better, as far as I am concerned-as early as the third grade. There is a dearth of cybersecurity...more
On June 12, 2015, the German Parliament (Deutscher Bundestag) passed an Act to Improve the Security of Information Technology Systems ("IT-Security Act"). The new legislation requires operators of so-called critical...more