Compliance Tip Of the Day: Using AI to Transform Whistleblower Response
JONES DAY TALKS®: Women in IP – AI and Copyright Law Need-to-Knows
The FinReg Frontier: AI and Machine Learning in Consumer Finance — The Consumer Finance Podcast
Key Discovery Points: AI Says AI Will Replace Paralegals… But Not So Fast!
Compliance and AI: Ali Khan on Implementing AI Risk Management Systems
Key Discovery Points: Get Your Copy of the 2025 eDiscovery State of the Industry Report
Approach to Responsible AI
AI and Compliance
Bridging the Gap: How CivicReach is Revolutionizing Government Customer Service
Episode 358 - Ethics and Compliance Trends for 2025: Is Your Company Prepared?
Consumer Finance Monitor Podcast Episode: The Patterns of Digital Deception
No Password Required Podcast: Senior Security Researcher at Nokia and Guardian of Secure AI Networks
Episode 354 -- The New Era of Compliance: Generative AI, Data and Innovation
The Growing Role of State AGs in AI Regulatory & Enforcement Issues — The Good Bot Podcast
Crafting an Effective Law Firm Generative AI Policy for Responsible Business Use: On Record PR
The Privacy Insider Podcast Episode 9: I Think, Therefore I Am: AI, Ethics, & Humanity With Dr. Michael Hemenway
AI Post-Election – Initial Government Insights
Can You Copyright AI-Generated Content? - On Record PR
How Attorneys’ Views on AI Are Impacting eDiscovery
From Innovation to Implementation: The Ethics of Generative AI in Law Firms - On Record PR
AI is technology that enables computers to simulate human intelligence and problem-solving skills, whereas deepfake is synthetic media that has been digitally manipulated to replace and mimic one person’s likeness. AI has...more
The widespread availability of Artificial Intelligence (AI) tools has enabled the growing use of “deepfakes,” whereby the human voice and likeness can be replicated seamlessly such that impersonations are impossible to detect...more
Cyberattacks powered by artificial intelligence have become more sophisticated as bad actors utilize machine learning to analyze vulnerabilities, automate exploits, and outpace traditional security measures. Through the use...more
Everyone thinks they can spot a phishing email. If true, we would not see so many security incidents, data breaches, and ransomware attacks. The statistics are overwhelming that phishing emails are a significant cause of data...more
Gone are the days where technological solutions were “nice to have” options to provide us with better access to resources and improved process efficiencies. Nowadays, technological solutions – and specifically those that...more
MIT Report Details New Cybersecurity Risks - “Cloud misconfigurations, more sophisticated ransomware, and vendor exploitation attacks are contributing to rising cyberattacks.” Why this is important: Worldwide spending...more
Each new technology seems to offer creative tools for both criminals and law enforcement. Telegraphs and telephones spawned wire and phone fraud. The era of digital networking ushered in the age of hacking. Digital banking...more