Episode 271 -- Deep Dive into Microsoft's OFAC Settlement for $3 Million
Everything Dynamic Everywhere: Managing a More Collaborative Microsoft 365
Microsoft 365 and the Age of Automation
Compliance Into The Weeds - Antitrust Issues in Microsoft Acquisition of Activision Blizzard
Everything Compliance - Episode 93 - The Activision Blizzard Edition
Microsoft Week on Innovation in Compliance -Legal Compliance for The Future with Alan Gibson
Keeping Up with M365 Software Updates
Efficiently and Defensibly Addressing Microsoft Teams Data
M365 in 5 – Part 7: Teams Audio/Video (A/V) Conferencing
M365 in 5 – Part 6: Teams Channels – The virtual collaboration workspace
M365 in 5 – Part 5: Teams Chats – Modern communications
M365 in 5 – Part 4: Teams – An introduction to collaboration
M365 in 5 – Part 3: OneDrive for Business – Protected personal collaboration
M365 in 5 – Part 2: SharePoint Online – The new file-share environment
M365 in 5 – Part 1: Exchange Online – Not just a mailbox
Episode 104 -- A Deep Dive into the Microsoft FCPA Settlement
This Week in FCPA-Episode 164, week ending July 26, 2019 – the Microsoft and Facebook settle edition
Is the Patent Litigation Boom Coming to an End?
Microsoft Makes Minority-Owned Firm Its Premier Provider
American Airlines Group Inc. stated that it plans to pledge its loyalty program “as collateral for a $4.75 billion government loan as it seeks to shore up capital to manage through the coronavirus pandemic.” The company...more
Big-Tech/Antitrust Update: the FTC has demanded information from Amazon.com Inc., Apple Inc., Facebook Inc., Microsoft Corp., and Alphabet Inc. regarding acquisitions of small firms over the past 10 years that may have been...more
If you don’t have new grounds to add, you may as well copycat. On September 4, 2019, the PTAB denied Microsoft’s petition requesting inter partes review (“IPR”) of U.S. Patent No. 7,167,487 (“the ’487 patent”); furthermore,...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more