Podcast - Betty... embargaron Ecomoda
Fraud, the silent epidemic
10 For 10: Top Compliance Stories For the Week Ending, May 3, 2025
2 Gurus Talk Compliance: Episode 51 – The Compliance Week at 20 Edition
The Next FCRA Frontier: Identity Theft and CFPB Updates — FCRA Focus Podcast
Daily Compliance News: April 29, 2025, The GenZ/RTO Edition
Adventures in Compliance: The Novels – A Study in Scarlet, Introduction to Compliance Lessons
Unlocking the Secrets of Reverse Mortgages — The Consumer Finance Podcast
False Claims Act Insights - DOJ’s Reliance on FCA to Pursue Covid-Related Fraud
10 For 10: Top Compliance Stories For the Week Ending April 12, 2025
Elder Financial Exploitation
Daily Compliance News: April 7, 2025, The Whistleblowers Awarded Edition
An Ounce of Prevention Podcast | Preparing for the UK Failure to Prevent Fraud Offence
Sunday Book Review: March 23, 2025, The Hard-Boiled Edition
10 For 10: Top Compliance Stories For The Week Ending, March 22, 2025
Daily Compliance News: March 14, 2025, The $200 Transaction Edition
PilieroMazza Annual Review: What DOJ’s 2024 FCA Report Means for Government Contractors
Episode 354 -- The New Era of Compliance: Generative AI, Data and Innovation
12 Days of Regulatory Insights: Day 4 - A Focus on the FCA – Regulatory Oversight Podcast
Corruption, Crime & Compliance: Raytheon Pays $950 Million to Resolve Fraud, FCPA, ITAR and False Claims Act Violations
Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed. ...more
In recent news, New York’s Stram Center for Integrative Medicine reported a security incident involving an employee misusing a patient’s payment card information. According to a breach report filed with the U.S. Department of...more
Between January 2023 and June 2024, cyber threats targeting Europe’s financial sector escalated, posing risks to banks, financial service providers, and regulatory bodies. According to the ENISA Threat Landscape: Finance...more
North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more
We have repeatedly warned our readers about malicious QR codes and their use by threat actors. Threat actors are now using these codes to disguise packages as gifts....more
On January 13, 2025, during the National Retail Federation’s “Big Show,” in-house attorneys from a variety of leading retailers gathered in the General Counsel's Forum to discuss key legal issues impacting the retail...more
The UK Information Commissioner’s Office (the ICO) has published guidance to help firms take steps to protect customers’ personal information when data is shared between firms to prevent fraud and scams....more
Remote worker fraud is expected to continue to proliferate in 2025. Fully remote hiring and work, particularly in the technology sector, continues to pose unique business and legal risks for companies. Just in December 2024,...more
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
On May 15, 2024, the Federal Trade Commission Chair Lina M. Khan appeared before the House Appropriations Subcommittee on Financial Services and General Government to discuss the agency’s FY 2025 budget request and ongoing...more
Selected Developments in U.S. Law - U.S. Department of Commerce Announces the Establishment of a Global CBPR Forum On April 21, 2022, Canada, Japan, South Korea, the Philippines, Singapore, Taiwan, and the United States...more
The New York AG recently issued information about steps companies can take to protect against credential stuffing attacks, and how to handle them if they occur. The guidance makes up a majority of a larger AG report on...more
CYBERSECURITY - New Jersey Settles with Cancer Center Over Business Email Compromise - One of the challenging things about HIPAA (Health Insurance Portability and Accountability Act) enforcement is the fact that both the...more
Do you want a simple way to keep current on important privacy changes? Avoid sleepless nights wondering whether you missed a privacy speed bump or pothole between annual updates? Worry no longer. Troutman Pepper is pleased to...more
As we anticipated last spring, the Department of Justice (DOJ) has signaled that it will utilize civil enforcement of the False Claims Act (FCA) to address new and emerging cybersecurity threats. On October 6, 2021, Deputy...more
When it comes to scams and frauds, it's not just individuals at risk, but also companies. In Episode 2 of Digging Deeper, Chris Morgan Jones interviews Jordan Arnold about corporate scams, and they even discuss cracking the...more
New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more
Hardly a week goes by without a news report of a new cyberattack. As any consumer affected by fraud knows, the harm is real. The impact on businesses, government, and other targets is also real, and includes monetary harm...more
The Consumer Protection Principles continue the CFPB’s expansive approach. Stating that it wants to ensure that “any new payment systems are secure, transparent, accessible, and affordable to consumers” and have “robust...more