Podcast - A Comparative Guide to Obtaining an FCL: DCSA vs. the Intelligence Community
CHPS Podcast Episode 4: Tariffs and Trade Impact
SBR-Author’s Podcast: The Unseen Life of an Undercover Agent: A Conversation with Charlie Spillers
Daily Compliance News: May 21, 2025, The I Want You Back Edition
All Things Investigations: Task Force Strategies - Addressing New Government Priorities
Wiley's 2025 Key Trade Developments Series: CFIUS Review and Outbound Investments
Compliance Tip of the Day: Standing at the Turning Point
Regulatory Ramblings: Episode 68 - Why Geopolitical Risk Matters to Compliance and Legal Staff with Mark Nuttal and Chad Olsen
Episode 366 -- DOJ Issues Data Security Program Requirements
CHPS Podcast Episode 3: Unlocking America's Mineral Potential
No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
Sunday Book Review: April 13, 2025, The Books on Trade and Tariffs Edition
Podcast - The "I" in FOCI and AI: Innovation, Intelligence, Influence
Podcast - What Are Joint Ventures and When Should They Get Cleared?
FINCast Ep. 40 – 21st Century Financial Warfare: Technology, Economy, & National Security
All Things Investigations: Terrorism Designations of Mexican Cartels Fundamentally Enhances Risk for All Companies
Podcast - Reflecting on Careers in National Security Law
The Presumption of Innocence Podcast: Episode 54 - The Flaws of FARA: Feeble Oversight of Billions in Foreign Influence
Podcast - Navigating Regulatory Challenges in M&A Transactions
Foreign Correspondent: An FDI Podcast | Mapping the National Security Landscape for Investors
The National Security Agency’s Artificial Intelligence, Security Center (AISC), together with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals...more
The rise of artificial intelligence has brought both opportunities and challenges to the workplace. However, a growing trend of employees using free or unauthorized AI tools poses significant risks, from security breaches to...more
On April 11, the Department of Justice's National Security Division (NSD) published new guidance on recent measures to restrict the ability of adversarial foreign governments and other foreign entities of concern to access...more
Under the new administration, the Customs and Border Protection Agency (CBP) is enforcing immigration laws more strictly, thus making the entry landscape into the United States challenging and burdensome for foreign...more
On April 8, the Department of Justice’s (“DOJ’s”) final rule on Preventing Access to US Sensitive Personal Data and Government-Related Data by Countries of Concern or Covered Persons (the “Rule”) formally took effect. ...more
On January 8, 2025, the U.S. Department of Justice (“DOJ”) issued its final rule to implement Executive Order 14117 aimed at preventing access to Americans' bulk sensitive personal data and government-related data by...more
On April 11, 2025, the National Security Division (NSD) of the Department of Justice issued a press release (Press Release) that outlines its approach to implementing and enforcing the DOJ’s recent final rule on “Preventing...more
Alabama and Oklahoma have become the latest states to ban from state-owned devices and networks certain AI tools with links to foreign governments. ...more
Quantum computing (QC) is poised to disrupt cybersecurity in ways that business leaders and legal professionals cannot afford to ignore. But what exactly is quantum computing, why does it pose such a significant threat to...more
The guidelines specify the requirements for data controllers to conduct risk assessments related to the transfer or disclosure of personal data outside the Kingdom. ...more
U.S. companies and organizations have entered a new era of sweeping restrictions on cross-border data transfers. The Department of Justice's (DOJ) Final Rule, "Preventing Access to U.S. Sensitive Personal Data and...more
The convergence of industry leaders, venture capitalists, and the Department of Defense at Maxar’s Orbital Edge event during SXSW highlighted the evolving dynamics of space as a domain of innovation and opportunity....more
On March 13, 2025, the Federal Communications Commission’s (“FCC”) Chairman Brendan Carr announced the creation of a Council on National Security (the “Council”) with Adam Chan serving as the Director. This new Council will...more
A coalition of 21 Republican AGs, led by Montana AG Austin Knudsen, is urging Congress to pass the No DeepSeek on Government Devices Act, which would prohibit downloading and using DeepSeek’s AI software on government...more
Amidst unprecedented trade tensions with the United States, on March 5, 2025, the Government of Canada (Government) released updated Guidelines on the National Security Review of Investments (Guidelines) under the Investment...more
As global trade policy evolves faster than ever, now is the time to connect with your peers, discover new strategies, and most importantly, hear from the regulatory agencies on the front lines of policy change. ACI’s 15th...more
This Tuesday, Michael Kratsios, who is President Donald Trump’s nominee for Director of the White House Office of Science and Technology Policy (OSTP), will appear before the Senate Commerce Committee for a hearing. During...more
The Department of Defense (DoD) recently issued a memo titled, "Implementing the Cybersecurity Maturity Model Certification (CMMC) Program: Guidance for Determining Appropriate CMMC Compliance Assessment Levels and Process...more
North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more
As noted , the renewable energy sector faces growing concerns over its vulnerability to cyberattacks. Since then, the situation has not improved; the U.S. electrical grid has grown more vulnerable to cyberattacks, with...more
Soon after the Chinese generative artificial intelligence (AI) company DeepSeek emerged to compete with ChatGPT and Gemini, it was forced offline when “large-scale malicious attacks” targeted its servers. Speculation points...more
The wireless industry has revolutionized the way we connect, from facilitating teleworking, distance learning, and telemedicine to allowing the American public to interact virtually in almost all other aspects of their daily...more
On January 14, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released the AI Cybersecurity Collaboration Playbook (the “Playbook”) to provide guidance to organizations within the AI community (including AI...more
On January 8, 2025, the U.S. Department of Justice (DOJ) published final rules (the Final Rules) to prohibit or restrict transactions by U.S. persons that could result in access to sensitive data by persons associated with...more
The Department of Justice (“DOJ”) published its final regulations on “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countries of Concern or Covered Persons” (the “Final Rule”). The Final...more