Machine Learning for Environments with Bad Actors
Jenny Radcliffe on People Hacking
AFSA Extra Credit Podcast: Navigating Advertising During COVID-19
Compliance Perspectives: The Right Kind of Wrong
JOBS Act Implementation Regulations
North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more
In an era of active U.S. sanctions policy, it is not uncommon to see the Office of Foreign Assets Control (“OFAC”) issue a notice changing U.S. sanctions – promulgating a new sanctions program or updating the designation of a...more
On December 11, the Department of Justice, the Department of Commerce’s Bureau of Industry and Security (BIS), the Department of Homeland Security, the Department of State’s Directorate of Defense Trade Controls (DDTC), and...more
Executive Summary - The North Korean threat to the crypto ecosystem is the highest form of immediate risk to the crypto-economy driven by a regime that seeks to profit from its misuse to reinforce its regime and fuel all its...more
Privacy In Focus®- In 2021, cyber gained prominence as a top business risk and national security concern with ransomware attacks wreaking havoc on business operations and critical infrastructure. Companies large and small,...more
Federal officials have recently warned employers and businesses that they could have insult added to injury if they respond to cyberattacks by making ransomware payments – increasingly requested through cryptocurrency – as...more
The Trump Administration rounded out the year with two sanctions-related actions: The first involved creating a new program regarding human rights abusers and global corruption; the second involved adding several individuals...more
The Office of Foreign Assets Control (“OFAC”) wrapped up 2017 by issuing a series of high-profile designations generally prohibiting U.S. persons from conducting financial or other transactions with the identified individuals...more