Podcast - Innovations and Insights in the Palliative Care Space
Regulatory Ramblings: Episode 69 - Human Intelligence vs. Machine Judgment with Nigel Morris-Cotterill and Patrick Dransfield
CareYaya: A Revolutionary Approach to Elder Care
Innovation in Compliance: Innovative Approaches to Compliance and Training with Catherine Choe
Daily Compliance News: May 15, 2025, The Downfall in Davos Edition
Work This Way: A Labor & Employment Law Podcast | Episode 46: The 2025 Greenville SHRM Conference with Tyler Clark and Brittany Goforth of GSHRM
Early Returns Podcast - Oliver Roberts: AI and the Law, and an Education
Daily Compliance News: May 14, 2025, The Widened Whistleblower Program Edition
No Password Required: CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Daily Compliance News: May 13, 2025, The Leaving on a Jet Plane Edition
FCPA Compliance Report: Upping Your Game in Compliance
Episode 368 — LRN Issues New Report Highlighting Growing Gap in Compliance Program Performance
Creativity and Compliance: From Compliance Enforcers to Trusted Advisors: The Path Forward
Compliance and AI: Navigating Regulatory Challenges in 2025 with Allison Lagosh
Top Healthcare Compliance Priorities for 2025
Joe Green & Monica Rodriguez Kuniyoshi on Integrating Generative AI with Your Experts - Passle CMO Series Podcast RE-RELEASE:
Innovation in Compliance: Exploring the Intersection of Compliance, Technology, and AI with Ben Sperry
Harnessing the Power of eDiscovery: The Revolution of AI and Technology in Litigation and Investigations - The Consumer Finance Podcast
CMO Series Podcast RE-RELEASE: Tracey Whyte on Getting The Most Out of AI in a Lean Marketing and BD team
Digital Asset Companies Announce New Partnerships, Acquisitions, Products - A recent press release announced that Ripple, a U.S. fintech and digital asset infrastructure provider, has agreed to acquire Hidden Road, a prime...more
As we prepare to close the books on another eventful year in the cyber and privacy space, Wiley’s cyber insurance team is already making predictions for 2025. Q: So, let’s get right into it – based on your experience this...more
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
Cybercriminals continue to outpace the best efforts of regulators, law enforcement, and cybersecurity professionals. Recent reporting from the Federal Bureau of Investigation demonstrates that cybercriminals are increasingly...more
EigenLayer TVL Surpasses $20B; New Self-Custodial Wallet Features Launch - According to recent reports, the total value locked (TVL) on the Ethereum network-based EigenLayer restaking protocol recently surpassed $20...more
Although artificial intelligence (“AI”) improves how businesses interact with customers, process sales, manage inventory and more, it also heralds new and unique cybersecurity risks. These risks can lead to unprecedented...more
Most everyone in the AI and legal worlds by now knows about the New York Times (“NYT”) suit against Microsoft and various Open AI entities (“OAI”). The NYT alleges copyright infringement by the practice of OAI, and most all...more
From large-scale hacks to new rules governing cyber practices, the cyber landscape continues to become more complex. The risk for breaches is higher than ever before. The numbers support this declaration. According to the...more
In 2024, businesses will continue to face an evolving landscape of cyber threats, along with an increasingly complex regulatory environment. With heightened scrutiny from regulators, consumers, and investors, the need to...more
The Most Significant Developments in Cybersecurity and Cyber-Related Liability Risks - As we reflect upon 2023, it will unfortunately be remembered as a record-breaking year for ransomware and cybercrime....more
CYBERSECURITY - Hackers Steal $4.4M Crypto Using Data Linked to LastPass Breach - According to Bleeping Computer, crypto fraud researchers at ZachXBT, and MetaMask developer Taylor Monahan have reported that on October 25,...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
The annual Cost of a Data Breach Report (Report) published by IBM is reliably full of helpful cybersecurity data. This year is no different. After reviewing the Report, we pulled out some interesting data points. Of course,...more
Hackers responded to the White House call by the thousands, including reporter-AI-hacker Ralph Losey, to try to break existing software in open contests. Ralph joined in the AI hack attack, but there were many other...more
Publications and Advisories - July 31, 2023 – Dave Brown, Kate Hanniford, Kim Peretti, Julia Mediamolle, Cara Peterman, Sierra Shear, Kristen Bartolotta, and Kezia Osunsade published “Securities Law, Securities Litigation,...more
Since the public release of OpenAI’s ChatGPT in November 2022, the internet has exploded with content on the pros and cons of the use of artificial intelligence (AI). For business owners, the primary discussions revolve...more
Ransomware has become a major threat to businesses across the world as cyber-attacks are becoming increasingly sophisticated, resulting in devastating financial damage for companies that fall victim. Not only are important...more
CYBERSECURITY - CISA Lists Top CVEs Exploited by Chinese State-Sponsored Cyber Actors - The Cybersecurity & Infrastructure Security Agency (CISA) recently issued an Alert outlining the top Common Vulnerabilities and...more
Technology has brought efficiency into the workplace, but not without legal risk. Employers are increasingly tasking technology to assist with human resource functions, security, and workplace monitoring, all of which can...more
CYBERSECURITY - CISA + MS-ISAC Alert: Threat Actors Exploiting Zimbra Collaboration Suite - On August 16, 2022, CISA (the Cybersecurity and Infrastructure Security Agency) and the Multi-State Information Sharing & Analysis...more
CYBERSECURITY - Twilio Hit with Social Engineering Smishing Scheme - We’ve explained smishing schemes before. Smishing is like phishing, but uses SMS texting to deliver malicious code to users’ phones, or tricks the user...more
Takeaway: Companies need to be vigilant about feeding their machines clean data to avoid hackers poisoning their networks. Artificial intelligence is everywhere: from facial recognition technology to weather forecasting. ...more
CYBERSECURITY - CISA/FBI Advisory Warns of Destructive Malware Used Against Ukraine - The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued a joint advisory this week alerting organizations of...more
The technology sector runs the gamut from artificial intelligence (AI), the Internet of Things (IoT) to SaaS companies or cybersecurity, and from the biggest household names to the smallest companies being operated out of...more