10 For 10: Top Compliance Stories For the Week Ending May 10, 2025
Daily Compliance News: May 6, 2025 the Made in China Edition
Daily Compliance News: May 5, 2025, The Washing Edition
Daily Compliance News: April 30, 2025, The 4 AM Wake-Up Call Edition
10 For 10: Top Compliance Stories For the Week Ending April 26, 2025
Daily Compliance News: April 25, 2025, The Trouble in Travel Edition
What's the Buzz in the Battery World With Roger Miksad, BCI – Battery + Storage Podcast
State AG Pulse | “Don’t Mess With Our Health or Our Kids!”
Daily Compliance News: April 21, 2025, The Tribute to Pope Francis Edition
Daily Compliance News: April 17, 2025, The Musk Fights BEE's Edition
Tit For Tat US China Trade War
Daily Compliance News: April 14, 2025, The Cascade of Corruption Edition
Sunday Book Review: April 13, 2025, The Books on Trade and Tariffs Edition
10 For 10: Top Compliance Stories For the Week Ending April 12, 2025
Daily Compliance News: April 11, 2025 The Tariff Rollback Edition
Daily Compliance News: April 10, 2025, The Dark Money Corruption Edition
Daily Compliance News: March 26, 2025, The Missile Strike on Boeing Edition
Daily Compliance News: March 24, 2025, The ABC Task Force Edition
Regulatory Ramblings: Episode 65 – The Trump Administration’s Decision to Halt FCPA Enforcement – The Implications for Asia and the World with Tom Fox, Malcolm Nance, and Philip Rohlik
Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector
On March 13, 2025, the Federal Communications Commission’s (“FCC”) Chairman Brendan Carr announced the creation of a Council on National Security (the “Council”) with Adam Chan serving as the Director. This new Council will...more
The Google Threat Intelligence Group (GTIG) recently published a new report “Adversarial Misuse of Generative AI,” which is well worth the read. The report shares findings on how government-backed threat actors use and misuse...more
Approaching midyear, business leaders are bullish on growth and the opportunities ahead. At the same time, the macro forces of GenAI, climate change, a multipolar geopolitical landscape and the erosion of trust and healthy...more
Last week the FBI Director, CISA Director, NSA Director, and National Cyber Director testified publicly about current and ongoing threats to US critical infrastructure providers by Chinese state-sponsored entities known as...more
The Cybersecurity & Infrastructure Security Agency (CISA) recently issued an Alert outlining the top Common Vulnerabilities and Exposures (CVEs) that have been used by the People’s Republic of China (PRC) state-sponsored...more
Ransomware/Malware Activity - Twitter Confirms Data Breach Affecting 5.4 Million Account Profiles - On August 5, 2022, Twitter confirmed it has suffered a data breach after receiving a report of a vulnerability through...more
CYBERSECURITY - Chinese APT41 Attacking State Networks - Although we are receiving frequent alerts from CISA and the FBI about the potential for increased cyber threats coming out of Russia, China continues its cyber...more
On February 23, 2022, Assistant Attorney General Matthew Olsen announced that the DOJ’s China Initiative was officially ending. He also announced DOJ’s new national security strategy - Strategy for Countering Nation-State...more
Report on Patient Privacy 21, no. 10 (October, 2021) - Conducting a risk analysis is a basic tenet of security compliance, with the overarching goal of understanding where protected health information (PHI) “lives” in an...more
The United States government, states, municipalities, and private companies all have been trying to defend themselves from cyber warfare from foreign adversarial governments, including Russia, China, and North Korea, for...more
Ransomware Attacks Predicted to Occur Every 11 Seconds in 2021 with a Cost of $20 Billion - Confirming what we are seeing in the field, cybersecurity firm Cybersecurity Ventures has predicted that, globally, businesses in...more
Researchers at Sentinel One and Dragos have detected malicious code, called EKANS or Snake, that has been designed specifically to target industrial control systems (ICS), including those of oil refineries, manufacturing...more
Concern over the spreading coronavirus from China is legitimate and real. The World Health Organization (WHO) has declared the coronavirus a global health emergency, and the United States and other countries are limiting...more
International companies should keep in mind recent developments coming out of Asia on the privacy front. Chinese authorities are reported to be confiscating smartphones at the border to install surveillance apps. Companies...more
The US’s ongoing trade war with China—which just isn’t going away any time soon—has prompted the White House to propose a new “$16 billion bailout for farmers hurt by Beijing’s tariffs.” At the same time, leaders from both...more
On March 28, 2019, the Oversight Board of the United Kingdom’s Huawei Cyber Security Evaluation Centre (HCSEC) released a report identifying “serious and systematic defects in Huawei’s software engineering and cyber security...more
Arrest of a Chinese National on Hacking Charges Illustrates How U.S. Tactics Are Changing to Meet the New Cyber Threat - In August, Yu Pingan, a Chinese national, was arrested on charges that he conspired to acquire and...more
Cybersecurity - Manufacturers continued to face challenges and find opportunities related to cybersecurity in 2015, and those trends can only be expected to intensify in 2016. New laws and new threats have either...more
Chinese President Xi Jinping made his first state visit to the United States last week, and his itinerary included meetings with U.S. technology company leaders as well as President Barack Obama. Not surprisingly, his hosts...more
In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more
Welcome to the dog days of summer 2015. Three privacy & security bits and bytes to start your week (if you are reading this on vacation … good for you!) 1. ICYMI: Massive Data Breach at OPM Claims Victim — The Director...more
Focusing on overseas cyber threats, President Obama issued an Executive Order on April 1, 2015, which grants authorization to impose sanctions on individuals and entities engaged "in malicious cyber-enabled activities that...more
This morning, the U.S. Department of Justice (DOJ) announced that a grand jury in the Western District of Pennsylvania has indicted five Chinese military officials on charges of computer hacking, economic espionage, and...more