Episode 366 -- DOJ Issues Data Security Program Requirements
CHPS Podcast Episode 3: Unlocking America's Mineral Potential
No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
Sunday Book Review: April 13, 2025, The Books on Trade and Tariffs Edition
Podcast - The "I" in FOCI and AI: Innovation, Intelligence, Influence
Podcast - What Are Joint Ventures and When Should They Get Cleared?
FINCast Ep. 40 – 21st Century Financial Warfare: Technology, Economy, & National Security
All Things Investigations: Terrorism Designations of Mexican Cartels Fundamentally Enhances Risk for All Companies
Podcast - Reflecting on Careers in National Security Law
The Presumption of Innocence Podcast: Episode 54 - The Flaws of FARA: Feeble Oversight of Billions in Foreign Influence
Podcast - Navigating Regulatory Challenges in M&A Transactions
Foreign Correspondent: An FDI Podcast | Mapping the National Security Landscape for Investors
Analyzing the Overlap Between CFIUS and FOCI
A Comprehensive Overview of FOCI Mitigation
Podcast - Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector, Part 2
AI Post-Election – Initial Government Insights
Mitigating FOCI Under Section 847
Podcast - Staying Compliant When Sharing Employees or Services
Everyone Come to Play: Exploring FOCI Mitigation Instruments
Podcast - FOCI Mitigation: SSAs, SCAs and Proxy Agreements
Between January 14 and January 19, 2025, the Ministry of Information, Communications, and Technology (the "Ministry") held a consultation on a draft of Kenya's National Artificial Intelligence (AI) Strategy 2025-2030. This...more
On 1 April 2025, the UK Department for Science, Innovation and Technology issued a policy statement setting out its key proposals for the new Cyber Security and Resilience Bill. The Bill is intended to respond to an...more
“And if you study the history of the world, the nations that are the most military and economically domineer [sic] are the nations that are the most innovative,” Sen. Jon Husted (R-OH) remarked at a recent congressional...more
This article is based on Carri Bennet’s April 9th presentation at the Palmetto Broadband Coalition Annual Convention in Greenville, S.C. In December 2024, the White House’s Deputy National Security Adviser for Cyber and...more
Alabama and Oklahoma have become the latest states to ban from state-owned devices and networks certain AI tools with links to foreign governments. ...more
In its first major initiative, on March 21, 2025, the Federal Communications Commission’s (FCC’s) newly formed Council on National Security (Council) launched an investigation into the “ongoing U.S. operations” of businesses...more
On this episode, we sit down with Trevor Hilligoss, director of security research and the research and innovation division of SpyCloud Labs. From his beginnings in the Army Criminal Investigation Division to his leadership...more
Olivia Trusty, nominee for the open Republican Federal Communications Commission (FCC or Commission) Commissioner position, appeared before the U.S. Senate Committee on Commerce, Science, and Transportation. Trusty has...more
Wired has reported that several government officials involved in the Signal chat exposing sensitive national security plans have also exposed their Venmo accounts by not adjusting their account privacy settings to prohibit...more
In the 20th episode of "Are We All Clear? Facilitating Security Clearances," host Molly O'Casey is joined by John Metz, a product manager at Agile Defense, and Antonia Tzinova, the head of Holland & Knight's CFIUS and...more
In the face of rising cybercrime, end-to-end encryption has become a point of tension between the protection of secrets, public security, and technological sovereignty. At stake: preserving encryption as a safeguard for...more
This regular alert covers key policy and regulatory developments related to EU geopolitical risks, including in particular, economic security, Russia’s war against Ukraine, health threats, and cyber threats. It does not...more
On January 8, 2025, the U.S. Department of Justice (Department or DOJ) issued new rules required by then-President Biden’s February 2024 Executive Order (EO) 14117 to establish a new regulatory framework aimed at “Preventing...more
The various wars that have taken place around the world in recent years, including the Russia-Ukraine war and the Swords of Iron War, have placed the DefenseTech sector in the spotlight. Amid changes in global security...more
Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more
WCB Invites Comment on Privacy Issues Related to Text-to-988 Georouting: In this Public Notice (PN) the Wireline Competition Bureau (WCB) within the Federal Communications Commission (FCC or Commission) seeks additional,...more
The order prioritizes extensive policy reviews, the introduction of a National Resilience Strategy and National Risk Register, and increased reliance on state and local governments to strengthen national infrastructure....more
On March 20, 2025, the American Hospital Association (AHA) and the Health-ISAC issued an alert to the health care sector warning of a social media post that posed a potential threat “related to the active planning of a...more
The House Oversight and Accountability, Judiciary, and Energy and Commerce Committees recently released their formal authorization and oversight plans for the 119th Congress, offering detailed insight into the investigative...more
On March 19, 2025, the White House released Executive Order (EO) 14239, Achieving Efficiency Through State and Local Preparedness, which calls for a comprehensive review of and changes to many long-standing federal...more
WHAT: Department of Defense (DOD) Secretary Pete Hegseth issued a memorandum titled “Directing Modern Software Acquisition to Maximize Lethality” that is intended to reform DOD’s procurement involving software development....more
With every change in administration, organizations and individuals face changes in the types of conduct the federal government focuses on in its investigations, enforcement, and criminal prosecutions. ...more
As NATO’s strategic priorities evolve, the accession of Finland and Sweden marks a significant shift in the alliance’s defense landscape. With these Nordic nations integrating into NATO’s security framework, their defense...more
With global economic alliances shifting and new threats emerging, will the U.S. maintain its dominance in an increasingly complex world? From cryptocurrency to chips to cyberterrorist threats, the battle for global dominance...more
Policymakers and technologists have expressed concern that DeepSeek, a Chinese AI company with connections to the Chinese Communist Party (CCP) and the potential to share user data with China Mobile, could be putting U.S....more