Regulatory Ramblings: Episode 69 - Human Intelligence vs. Machine Judgment with Nigel Morris-Cotterill and Patrick Dransfield
Early Returns Podcast - Oliver Roberts: AI and the Law, and an Education
No Password Required: CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things
5 Key Takeaways | AI and Your Patent Management, Strategy & Portfolio
Compliance Tip Of the Day: Using AI to Transform Whistleblower Response
JONES DAY TALKS®: Women in IP – AI and Copyright Law Need-to-Knows
The FinReg Frontier: AI and Machine Learning in Consumer Finance — The Consumer Finance Podcast
Key Discovery Points: AI Says AI Will Replace Paralegals… But Not So Fast!
Compliance and AI: Ali Khan on Implementing AI Risk Management Systems
Key Discovery Points: Get Your Copy of the 2025 eDiscovery State of the Industry Report
Approach to Responsible AI
AI and Compliance
Bridging the Gap: How CivicReach is Revolutionizing Government Customer Service
Episode 358 - Ethics and Compliance Trends for 2025: Is Your Company Prepared?
Consumer Finance Monitor Podcast Episode: The Patterns of Digital Deception
No Password Required Podcast: Senior Security Researcher at Nokia and Guardian of Secure AI Networks
Episode 354 -- The New Era of Compliance: Generative AI, Data and Innovation
The Growing Role of State AGs in AI Regulatory & Enforcement Issues — The Good Bot Podcast
Crafting an Effective Law Firm Generative AI Policy for Responsible Business Use: On Record PR
The Privacy Insider Podcast Episode 9: I Think, Therefore I Am: AI, Ethics, & Humanity With Dr. Michael Hemenway
AI-Powered: Corporate Strategies Versus Hacker Tactics - How can companies use artificial intelligence to respond more efficiently to threats, and what innovative attack methods are hackers developing with the help of AI?...more
The “Bad Likert Judge” jailbreaking technique boasts a high attack success rate by using a three-step approach which employs the target LLM’s own understanding of harmful content to bypass the target LLM’s safety guardrails....more
Cyber issues are seldom out of the news, from ransomware attacks and espionage to non-malicious outages that cause widespread concern. Organizations need to protect themselves against both current and future risks and...more
Publications & Advisories - November 2024 – Kathleen Benway, Jennifer Everett, Alysa Austin, and Kristen Bartolotta published “Federal Trade Commission’s Updated Health Breach Notification Rule Is Now in Effect” in Employee...more
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
As regulators worldwide continue to scrutinize the impact of AI on industries within their respective purviews, two key global agencies issued guidance in October 2024 that highlighted AI-based cybersecurity risks and best...more
Cyber, Privacy, and Technology Report - Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed....more
The New York Department of Financial Services (NYDFS) issued new guidance (the Guidance) on October 16, 2024, to help state-regulated financial institutions mitigate the myriads of cybersecurity risks posed by artificial...more
Technological advancements are plentiful in the world of cybersecurity and are often seen as a double-edged sword, a sentiment that holds true in the rise of generative AI. As AI gains traction for its versatility and power,...more
Cyberattacks powered by artificial intelligence have become more sophisticated as bad actors utilize machine learning to analyze vulnerabilities, automate exploits, and outpace traditional security measures. Through the use...more
Gone are the days where technological solutions were “nice to have” options to provide us with better access to resources and improved process efficiencies. Nowadays, technological solutions – and specifically those that...more
Almost from the very beginning of the internet era, the world has been increasingly afflicted with cyberfraud, exploiting the internet’s potential to enable fraudsters to induce unsuspecting victims to transfer money to...more