Crypto & Politics: Insights from Former Congressman David McIntosh
Ask a CFIUS Expert: Is Crypto Spying on Us?
Dogecoin’s Day in Court
A Tale of Two Crypto Cases
Unpacking the Lummis-Gillibrand Payment Stablecoin Act: Implications for the Digital Asset Industry — The Crypto Exchange Podcast
Podcast: Is Cryptocurrency a Security (like an orange grove)?
Navigating the Regulatory Waters: The SEC's Wells Notice to Uniswap and its Impact on DeFi — The Crypto Exchange Podcast
Will Resiliency Carry the Digital Asset Sector Through 2024: State-Level Developments — The Crypto Exchange Podcast
Will Resiliency Carry the Digital Asset Sector Through 2024: Navigating the 2023 Regulatory Landscape — The Crypto Exchange Podcast
Understanding the CFPB's Proposed Digital Payments Larger Participants Rule and Its Implications for Digital Assets — The Consumer Finance Podcast
What is sufficient originality for copyright? What is substantial similarity for copyright infringement? The latest artificial intelligence and intellectual property cases – authors lost contributory
Unraveling the Crypto Code: California's New DFAL Explained – The Crypto Exchange Podcast
FINCast Ep. 38 – The Future of Crypto: A Conversation with Coinbase’s Faryar Shirzad
Analyzing the Treasury's Illicit Finance Risk Assessment of Decentralized Finance - The Crypto Exchange Podcast
Digital Planning Podcast Episode: Exploring DAOs
Current Landscape of Cryptocurrency Regulation and Enforcement - The Crypto Exchange Podcast
Current Landscape of Cryptocurrency Regulation and Enforcement - The Consumer Finance Podcast
Episode 286 -- Matt Stankiewicz on the Ripple Decision and Celsius CEO Indictment
Turning up the Heat – A Look at the FTC’s Groundbreaking Fine Against Bankrupt Digital Asset Services Provider Celsius Network LLC - The Crypto Exchange Podcast
Consumer Finance Monitor Podcast Episode: A Deep Dive Into Cryptocurrency and its Risks to Investors and the Banking System, with Arthur E. Wilmarth, George Washington University Law School
This article concludes K2 Integrity’s mini-series promoting the importance of Cybersecurity Awareness Month. Throughout October, we have been providing tips and solutions to organizations to commemorate the 20-year...more
This article is the third in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity has been providing tips and solutions to organizations to commemorate the 20-year anniversary of the...more
This article is the second in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity will be providing tips and solutions to organizations to commemorate the 20-year anniversary of the...more
It’s important to stay secure throughout the year, and in October, cybersecurity takes on even more significance: since 2004, it has been designated as Cybersecurity Awareness Month. In the 20 years since its inception,...more
“What’s that password again? Where did I write these log-ins down again? Was it this password or the one I came up with three years ago?” Consider the daily frustrations we encounter with the bevy of passwords we need for...more
If you’re like most people, you’ve probably encouraged your elderly relatives to list of all their assets and contact information, including passwords to online accounts. This will enable you or other family members to access...more
Pennsylvania recently became one of the last states to enact a law treating digital assets and electronic records as tangible property, which allows executors, trustees, guardians, and agents to access and manage the digital...more
The digital revolution has touched virtually every aspect of our lives. The result is that one likely has at least a handful of “digital assets.” These assets may include personal assets, such as online bank and brokerage...more
Cybersecurity Awareness Month may have ended on October 31, but cyber criminals are active 365 days a year, and they’re online looking for vulnerabilities around the clock. Every day, we also spend time online: navigating the...more
Protecting your digital assets is as important as protecting your physical assets. Never think, “It won’t happen to me”—everyone has something that cyber criminals can steal. Stay secure by following a few basic guidelines....more
Many people have thoughtfully gathered information on the location of their bank accounts, deeds, lock boxes, safe combination, car title (and keys), investment accounts, check books, and other assets to make handling their...more
Over the holidays, it’s likely that you or a loved one received some type of computer or device that connects to internet websites, e-mail and applications. Or that pictures were taken and stored on such a device, or that...more
December Interest Rates for GRATs, Sales to Defective Grantor Trusts, Intra-Family Loans and Split Interest Charitable Trusts - The December § 7520 rate for use with estate planning techniques such as CRTs, CLTs, QPRTs...more
In an article earlier this year we noted that at a large number of states had introduced legislation to address an emerging issue that is unique to our Information Age: how will our digital assets be accessed and used (or...more
We, as a society, are gradually moving away from paper bank statements, jars with money in them, and instructions to loved ones scribbled on notepads. With the growth of our online presence, our lives can be governed almost...more
In the not-so-distant past, one likely kept copies of vital estate planning documents locked in a fire-resistant vault or file cabinet, with copies at an attorney’s office. However, in this digital age, it’s more likely that...more
Do you have a personal laptop computer, iPad, iPhone or other personal electronic device requiring an access password? Who, besides you, has that information? If something happens to you, how will your information be...more