What Is Ambient AI and Why Does It Matter to Lawyers & Legal Professionals?
The Authenticity Advantage: How Runbin Dong’s Scale Social AI Helps Small Businesses Shine
Key Discovery Points: A Judicial Approach to Handling AI-Generated Evidence
Richard Meneghello of Fisher Phillips on How Smart Content Can Set Your Firm Apart - Passle's CMO Series EP175
Feeling Disillusioned with AI? You’re Not Alone
Great Women in Compliance: GWIC X EC Q2 2025 - Exploring Compliance Innovations
Daily Compliance News: June 25, 2025, The PCAOB Elimination Hits Roadblock Edition
Podcast - FTC to Focus on Deceptive AI Claims: Compliance Management Strategies
Upping Your Game: Crowd - Sourcing Risk Management Intelligence with AI
Daily Compliance News: June 24, 2025, The Questions, Questions, and More Questions Edition
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 240: Independent Practice In Dermatology with Dr. Darragh and Dr. Shuler of Carolina Dermatology
#Risk New York Speaker Series – Bridging the Gap: Effective Risk Communication in Compliance with Rob Clark, Jr.
#Risk New York Speaker Series – Upping Your Game with Tom Fox
SBR-Author’s Podcast: Upping Your (Compliance) Game
Innovation in Compliance: Real-Time Fraud Prevention Strategies for Financial Loss Prevention with Vince Walden
Risk New York Speaker Series: AI Investments and Political Uncertainty with Chris Mason
Episode 373 -- Christian Focacci on Current Developments in AI and Risk Management
#Risk New York Speaker Series: Exploring AI Risks in Compliance with Gwen Hassan
Regulatory Rollback: Inside the CFPB’s FCRA Guidance Withdrawal — The Consumer Finance Podcast
Rethinking Records Retention
Digital Asset Companies Announce New Partnerships, Acquisitions, Products - A recent press release announced that Ripple, a U.S. fintech and digital asset infrastructure provider, has agreed to acquire Hidden Road, a prime...more
As we prepare to close the books on another eventful year in the cyber and privacy space, Wiley’s cyber insurance team is already making predictions for 2025. Q: So, let’s get right into it – based on your experience this...more
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
Cybercriminals continue to outpace the best efforts of regulators, law enforcement, and cybersecurity professionals. Recent reporting from the Federal Bureau of Investigation demonstrates that cybercriminals are increasingly...more
EigenLayer TVL Surpasses $20B; New Self-Custodial Wallet Features Launch - According to recent reports, the total value locked (TVL) on the Ethereum network-based EigenLayer restaking protocol recently surpassed $20...more
Although artificial intelligence (“AI”) improves how businesses interact with customers, process sales, manage inventory and more, it also heralds new and unique cybersecurity risks. These risks can lead to unprecedented...more
Most everyone in the AI and legal worlds by now knows about the New York Times (“NYT”) suit against Microsoft and various Open AI entities (“OAI”). The NYT alleges copyright infringement by the practice of OAI, and most all...more
From large-scale hacks to new rules governing cyber practices, the cyber landscape continues to become more complex. The risk for breaches is higher than ever before. The numbers support this declaration. According to the...more
In 2024, businesses will continue to face an evolving landscape of cyber threats, along with an increasingly complex regulatory environment. With heightened scrutiny from regulators, consumers, and investors, the need to...more
The Most Significant Developments in Cybersecurity and Cyber-Related Liability Risks - As we reflect upon 2023, it will unfortunately be remembered as a record-breaking year for ransomware and cybercrime....more
CYBERSECURITY - Hackers Steal $4.4M Crypto Using Data Linked to LastPass Breach - According to Bleeping Computer, crypto fraud researchers at ZachXBT, and MetaMask developer Taylor Monahan have reported that on October 25,...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
The annual Cost of a Data Breach Report (Report) published by IBM is reliably full of helpful cybersecurity data. This year is no different. After reviewing the Report, we pulled out some interesting data points. Of course,...more
Hackers responded to the White House call by the thousands, including reporter-AI-hacker Ralph Losey, to try to break existing software in open contests. Ralph joined in the AI hack attack, but there were many other...more
Publications and Advisories - July 31, 2023 – Dave Brown, Kate Hanniford, Kim Peretti, Julia Mediamolle, Cara Peterman, Sierra Shear, Kristen Bartolotta, and Kezia Osunsade published “Securities Law, Securities Litigation,...more
Since the public release of OpenAI’s ChatGPT in November 2022, the internet has exploded with content on the pros and cons of the use of artificial intelligence (AI). For business owners, the primary discussions revolve...more
Ransomware has become a major threat to businesses across the world as cyber-attacks are becoming increasingly sophisticated, resulting in devastating financial damage for companies that fall victim. Not only are important...more
CYBERSECURITY - CISA Lists Top CVEs Exploited by Chinese State-Sponsored Cyber Actors - The Cybersecurity & Infrastructure Security Agency (CISA) recently issued an Alert outlining the top Common Vulnerabilities and...more
Technology has brought efficiency into the workplace, but not without legal risk. Employers are increasingly tasking technology to assist with human resource functions, security, and workplace monitoring, all of which can...more
CYBERSECURITY - CISA + MS-ISAC Alert: Threat Actors Exploiting Zimbra Collaboration Suite - On August 16, 2022, CISA (the Cybersecurity and Infrastructure Security Agency) and the Multi-State Information Sharing & Analysis...more
CYBERSECURITY - Twilio Hit with Social Engineering Smishing Scheme - We’ve explained smishing schemes before. Smishing is like phishing, but uses SMS texting to deliver malicious code to users’ phones, or tricks the user...more
Takeaway: Companies need to be vigilant about feeding their machines clean data to avoid hackers poisoning their networks. Artificial intelligence is everywhere: from facial recognition technology to weather forecasting. ...more
CYBERSECURITY - CISA/FBI Advisory Warns of Destructive Malware Used Against Ukraine - The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued a joint advisory this week alerting organizations of...more
The technology sector runs the gamut from artificial intelligence (AI), the Internet of Things (IoT) to SaaS companies or cybersecurity, and from the biggest household names to the smallest companies being operated out of...more