10 For 10: Top Compliance Stories For the Week Ending May 10, 2025
Daily Compliance News: May 6, 2025 the Made in China Edition
Daily Compliance News: May 5, 2025, The Washing Edition
Daily Compliance News: April 30, 2025, The 4 AM Wake-Up Call Edition
10 For 10: Top Compliance Stories For the Week Ending April 26, 2025
Daily Compliance News: April 25, 2025, The Trouble in Travel Edition
What's the Buzz in the Battery World With Roger Miksad, BCI – Battery + Storage Podcast
State AG Pulse | “Don’t Mess With Our Health or Our Kids!”
Daily Compliance News: April 21, 2025, The Tribute to Pope Francis Edition
Daily Compliance News: April 17, 2025, The Musk Fights BEE's Edition
Tit For Tat US China Trade War
Daily Compliance News: April 14, 2025, The Cascade of Corruption Edition
Sunday Book Review: April 13, 2025, The Books on Trade and Tariffs Edition
10 For 10: Top Compliance Stories For the Week Ending April 12, 2025
Daily Compliance News: April 11, 2025 The Tariff Rollback Edition
Daily Compliance News: April 10, 2025, The Dark Money Corruption Edition
Daily Compliance News: March 26, 2025, The Missile Strike on Boeing Edition
Daily Compliance News: March 24, 2025, The ABC Task Force Edition
Regulatory Ramblings: Episode 65 – The Trump Administration’s Decision to Halt FCPA Enforcement – The Implications for Asia and the World with Tom Fox, Malcolm Nance, and Philip Rohlik
Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector
This monthly report outlines key developments in China’s data protection sector for March. The following events merit special attention...more
New York, Texas, and Virginia are the first states to ban DeepSeek, the Chinese-owned generative artificial intelligence (AI) application, on state-owned devices and networks....more
The Department of Commerce (Commerce) Office of Information and Communications Technology and Services (OICTS) has broad authority—born out of executive action during the first Trump administration—to identify and mitigate...more
Major U.S. companies targeted by North Korean threat actors disguised as remote IT workers. Multiple individuals responsible for stealing millions of dollars have already been apprehended by U.S. authorities....more
In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more
Chinese authorities have arrested alleged hackers in what appears to be the first-ever reported case of hackers using AI to develop ransomware. These alleged hackers reportedly used ChatGPT to refine the code for their...more
Multinationals with employees in the People’s Republic of China (PRC) continue to confront a November 30 deadline to implement China’s new cross-border data transfer mechanism—the Standard Contract. This implementation...more
The Cybersecurity & Infrastructure Security Agency (CISA) recently issued an Alert outlining the top Common Vulnerabilities and Exposures (CVEs) that have been used by the People’s Republic of China (PRC) state-sponsored...more
The National Institutes of Science and Technology (NIST) Information Technology Laboratory recently released guidance entitled “Software Supply Chain Security Guidance,” in response to directives set forth in President...more
CYBERSECURITY - Chinese APT41 Attacking State Networks - Although we are receiving frequent alerts from CISA and the FBI about the potential for increased cyber threats coming out of Russia, China continues its cyber...more
Microsoft has issued frequent updates on the Log4j vulnerability that we have been hearing so much about. The vulnerability is a serious problem that will become more widespread as time goes on....more
On August 17, 2021, China released the new regulations on the Security and Protection of Critical Information Infrastructure (CII Regulations), which became effective on September 1, 2021. Even though China started its...more
China’s State Council on August 17 released the Critical Information Infrastructure Security Protection Regulations (“Regulations”) effective September 1, a key administrative regulation in the implementation of the 2016...more
On June 10, 2021, the Standing Committee of the 13th National People's Congress passed the long awaited People's Republic of China (China) Data Security Law ("DSL") after a final read of the third draft. The DSL, which takes...more
On January 9, 2021, the Biden Administration issued Executive Order (EO) 14034, to further address the declared national emergency with respect to the information and communications technology and services (ICTS) supply...more
The new measure, which will come into effect on June 1, 2020, will potentially affect operators of critical information infrastructures as well as their domestic and overseas suppliers. Affected companies should now take...more
China’s State Administration for Market Regulation and the State Standardization Administration issued the recommended national standards named the Information Security Technology - Personal Information Security...more
Hackers who targeted airport currency exchange mainstay Travelex in a ransomware attack on New Year’s Eve have alerted British media that they possess 5 GB of sensitive customer data from the company “since gaining access to...more
Vicious malware continues to be deployed by China-based attackers. A new strain of malware, dubbed “HiddenWasp,” which has the ability to remotely infect computers, has been discovered by a security researcher at Intezar. The...more
The Chinese government has recently issued a flurry of regulations and standards, several in draft form for public comment, to implement the Cybersecurity Law. These mostly reflect a lengthy policy development process...more
The cybersecurity classified protection regime attracted significant attention when it was included in the Peoples Republic of China (PRC) Cyber Security Law promulgated in 2017 (the CSL). The CSL mandates that network...more
On May 15, 2019, President Trump issued an executive order (EO), "Executive Order on Securing the Information and Communications Technology and Services Supply Chain," prohibiting certain transactions involving...more
In an effort to phase out what many in the security world believe are threats to the cybersecurity posture of governmental agencies and private entities alike...more
On December 29, 2017, the Standardization Administration of China, jointly with the PRC General Administration of Quality Supervision, Inspection and Quarantine, issued the Information Security Technology – Personal...more
The U.S. Government is renewing its focus on mitigating technological risks by regulating the supply chain for various goods and services. ...more