Decoding Cyber Threats: Protecting Critical Infrastructure in a Digital World — Regulatory Oversight Podcast
How to Fix the Cyber Incident Reporting Mess--DHS Weighs In
[Podcast] Cyber Spotlight: Wiley Tackles White House’s National Cybersecurity Strategy and Other Developments
Federal Investigations within the Department of Homeland Security
The State of Cyber: Breaking Down Recent Rules and Regulations
Immigration Insights Podcast: International Entrepreneur Parole Program & Biometrics Requirement
DHS and Cyber: What Should Companies Expect?
Take 5 Immigration Podcast Series: Episode 10
Nota Bene Episode 90: U.S. Q3 Check In: Stimulus, Relief, Election, and Direction with Elizabeth Frazee and Jonathan Meyer
Is it the End of the EB-5 World as We Know it? How to Prepare for Potential Changes
Benesch B-Cast 07: Immigration Deadlines and Demands Employers Need to Know
Where Does the Cybersecurity Executive Order Hit and Miss the Mark?
Whether the United States Patent and Trademark Office (USPTO) possessed trademark registrations for its own trademarks was honestly not something I had ever thought about before. But then I received a link to the Director’s...more
This post is the second in our ongoing series on the heightened focus in 2020 on combating the sale of counterfeit goods. Our first article focused on the actions of the executive branch, while this article discusses the...more
Many U.S. brand owners already work with U.S. Customs and Border Protection (CBP), a division of the U.S. Department of Homeland Security, to keep counterfeit products out of the U.S. CBP examines cargo at more than 300 ports...more
In Brief - Where goods bearing a genuine trademark are altered and resold without altering the mark itself, such conduct does not constitute trafficking in counterfeit goods. Actual use of a counterfeit mark is a...more