Money-Saving Licensing Tips for Startups
Just Press "Play"
Lawyers Beware: There Could Be Serious Ethics Issues With The New AI Browsers
Project Catalyst an Economic Development Video Podcast | Episode 16: Powering Alabama’s Economic Progress with Leigh Davis of Alabama Power Company
LathamTECH in Focus: Navigating National Security: The Impact of FDI Reviews on Tech M&A
Podcast - Ejecución de facturas electrónicas
Julie Mortimer of Mills & Reeve on The Right Way to Kickstart Your CRM Strategy - Passle's CMO Series Podcast EP176
Sunday Book Review: July 20, 2025, The Best Books on Business Edition
Hospice Insights Podcast - AI in Action: Exploring How AI Is Helping Hospices Do Things in New Ways
Empowerment Through Hero Generation with Nicole a`Beckett and Dr. Shruti Roy
How to Rank in the Age of AI Search: On Record PR
SBR-Authors Podcast: A Journey Through Memoir, Technology, and Grief with Tony Stewart
Episode 373 -- Christian Focacci on Current Developments in AI and Risk Management
Law School Toolbox Podcast Episode 507: What Do I Need to Do Before the First Day of Law School? (1L Summer Series)
Meet Phil Leslie, Cornerstone Research's New Chief Technology and Innovation Officer
London Partner Roberta Downey Wired for Disputes: Tech, Infrastructure, and the New Frontier of Risk
Law School Toolbox Podcast Episode 505: Breaking ADHD Barriers with the Help of AI (w/Lindsay Scola)
No Password Required: CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things
(Podcast) The Briefing: No CTRL-ALT-DEL For the Server Test
Compliance Tip of the Day – Role of Chatbots in Compliance
On June 6, a new Executive Order (EO) on cybersecurity altered the compliance landscape for federal contractors. The order pauses the imminent requirement for software vendors to formally attest compliance with the Secure...more
Google recently issued its June Android Security Bulletin that is designed to patch 34 vulnerabilities, all of which Google designates as high-severity defects. The most serious flaw the patch is designed to fix in the...more
Never underestimate an operating system update from any mobile phone manufacturer. This week, Apple issued iOS 18.5 which provides enhancements to the user experience, but also fixes bugs and flaws....more
Welcome to Commercially Connected shorts, our weekly bitesize newsletter summarising the latest updates in UK commercial law. This week we look at: - UK-US and UK-India trade deals - Eversheds Sutherland’s global supply...more
On this episode, we sit down with Mariana Padilla, CEO and co-founder of HACKERverse.ai — an AI-driven platform transforming how cybersecurity solutions are tested and purchased. From her early days in education and...more
SAP Netweaver Visual Composer users are urged to patch a critical vulnerability that attackers are actively exploiting. According to ReliaQuest, which detected the vulnerability, the attacks allow full system compromise...more
WhatsApp users should update the application for vulnerability CVE-2025-30401, which Meta recently patched when WhatsApp was released for Windows version 2.2450.6....more
On March 28, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a Malware Analysis Report (MAR) on RESURGE malware, which is associated with the product Ivanti Connect Secure....more
There are several common misconceptions about open-source website content management systems (CMS) that often lead law firms and businesses to hesitate before adopting them...more
Space weather startup Perceptive Space raises USD2.8 million. Canadian startup Perceptive Space is developing new artificial intelligence (AI)-based software to forecast space weather more precisely. The company raised...more
As a Rhode Islander, I am a big fan of our former Governor and now Secretary of Commerce, Gina Raimondo. She has always had her eye on the ball of the rapidly developing data privacy and cybersecurity risks and threats to...more
Contech Trends to Watch in the New Year - “As builders adapt to economic, supply chain and labor challenges, they’re turning to technology to boost performance.” Why this is important: All of the turmoil of 2022 (the...more
The Federal Trade Commission (FTC) recently warned private entities to remediate any ongoing Log4j vulnerabilities present within their networks or face possible enforcement action....more
The National Institute of Standards and Technology (“NIST”) is seeking comments on its second draft of NIST SP 800-161 Rev. 1, “Cyber Supply Chain Risk Management Practices for Systems and Organizations,” published on October...more
The National Institute of Standards and Technology (“NIST”) is seeking comments on its draft NIST SP 800-161 Rev. 1, “Cyber Supply Chain Risk Management Practices for Systems and Organizations,” published on April 29, 2021....more
On May 12, 2021, the Biden Administration issued its much anticipated “Executive Order on Improving the Nation’s Cybersecurity.” Below are provisions we believe will be of most interest to contractors, as well as any company...more
Here’s how the SAP Community can mitigate the risk of a widespread cybersecurity incident involving their SAP systems....more
Is your ETRM system leaving you exposed to cybersecurity threats?...more
On November 20, 2020, the Centers for Medicare and Medicaid Services and Office of Inspector General released final rules amending the regulations to the Stark Law and the Anti-Kickback Statute and Beneficiary Inducement...more
On September 20, 2016, the Bureau of Industry and Security (BIS) of the U.S. Commerce Department amended the Export Administration Regulations (EAR) and the list of goods, software and technology that are controlled under the...more
October is National Cyber Security Awareness Month! Please join Williams Mullen, Marsh and EY for an in-depth discussion on effective strategies for identifying and mitigating data breach and related liabilities. WHO...more
Please join us for the 2015 FOLEYTech Summit. In its 11th year, the FOLEYTech Summit continues to offer the top-notch industry insight and compelling speakers you have come to expect from Foley & Lardner LLP, while embracing...more
The U.S. Department of Commerce Bureau of Industry and Security (BIS) recently published a proposed rule enhancing controls on certain cybersecurity items under the Export Administration Regulations (EAR). Specifically, the...more
The Commerce Department’s export control agency, BIS, has proposed a new rule to control exports of equipment and software designed or modified to perform network intrusion and internet protocol communications surveillance. ...more
The Bureau of Industry and Security (BIS) recently issued a $750,000 fine against an Intel subsidiary for the unlawful exportation of software products that enable encryption. This is a sharp departure from BIS’s historical...more