10 For 10: Top Compliance Stories For the Week Ending June 28, 2025
Episode 374 -- Justice Department Resumes FCPA Enforcement with New, Focused Guidance
Compliance Tip of the Day: New FCPA Enforcement Memo - What Does it Say?
Daily Compliance News: May 30, 2025, The Leissner Sentenced Edition
Daily Compliance News: May 28, 2025, The Moron Premium Edition
Daily Compliance News: May 27, 2025, The Boeing Off the Hook Edition
Daily Compliance News: May 22, 2025, The Trump and Dump Edition
Daily Compliance News: May 19, 2025, The Definition of Corruption Edition
10 For 10: Top Compliance Stories For the Week Ending May 10, 2025
Compliance into the Weeds: USRA Declination Case Study - Self-Disclosure Best Practices
Daily Compliance News: April 8, 2025, The End of Monitors Edition
10 For 10: Top Compliance Stories For The Week Ending April 5, 2025
2 Gurus Talk Compliance: Episode 48 – The March Madness Edition
10 For 10: Top Compliance Stories For The Week Ending, March 22, 2025
Regulatory Ramblings: Episode 65 – The Trump Administration’s Decision to Halt FCPA Enforcement – The Implications for Asia and the World with Tom Fox, Malcolm Nance, and Philip Rohlik
Daily Compliance News: March 19, 2025, The Why CISOs Quit Edition
10 For 10: Top Compliance Stories For the Week Ending March 15, 2025
Episode 356 -- Trump Administration Hits Pause on FCPA Enforcement
Episode 351 -- Deep Dive into the AAR FCPA Settlement
As data breach litigation continues to increase, companies need to worry about a new point of vulnerability - overseas employees. Many large companies outsource customer services to India and other low-cost providers to take...more
Commercial bribery enforcement also became more active, as the authorities marked the 30th anniversary of the PRC Anti-Unfair Competition Law. The revision of the PRC Anti-Espionage Law raised some concerns about national...more
Cybersecurity does not just pose technical challenges; companies must always keep their eye on the human component of cyber risk. For example, even the most damaging and sophisticated hacks – such as the recent Twitter hacks...more