Leaders in Law: The State of International Trade with Neena Shenai
Understanding FOCI Mitigation
Podcast - Navigating M&A Due Diligence: Safeguarding Security Clearances
An In-Depth Overview of the DCSA
Ask a CFIUS Expert: Is Crypto Spying on Us?
Podcast - Change Condition Packages: Tips for Cleared Contractors
Podcast - Corporate Documents in the Context of Clearances
Decoding the Key Management Personnel Requirements
Navigating Personnel Security Clearances (PCLs)
Wiley's 10 Key Trade Developments: Outbound Investments and CFIUS Review
What Is an FCL and How Do I Obtain One?
AGG Talks: Cross-Border Business - How Foreign Companies Can Protect Their IP and Brand in the U.S.
Emerging Technology in the FY24 NDAA
John Neiman on the Corporate Transparency Act
Wiley's 10 Key Trade Developments: Evolution of Export Controls
FINCast Ep. 39 – State of Russia Sanctions Two Years After the Invasion
AGG Talks: Cross-Border Business - Privacy & Cybersecurity Considerations for Non-U.S. Companies
Video: Making Trade Inclusive for All Americans: A Conversation with SAP's Michelle Trong Perrin-Steinberg
AGG Talks: Cross-Border Business — Episode 7: Trans-Pacific Business: Australia and the U.S. - Part 2
AGG Talks: Cross-Border Business — Episode 7: Trans-Pacific Business: Australia and the U.S. - Part 1
On November 30, 2021, the Department of Commerce’s Bureau of Industry and Security (BIS) published a notice of inquiry and request for comments on how U.S. and European Union dual-use export controls and practices may be...more
On October 5, 2020, the U.S. Department of Commerce’s Bureau of Industry and Security (BIS) published a rule implementing certain changes in the Export Administration Regulations (EAR) that were agreed upon in December 2019...more
ANTICORRUPTION DEVELOPMENTS - $34 Million SEC Settlement for Legg Mason - On August 27, 2018, the Securities and Exchange Commission (SEC) announced that Legg Mason Inc. will pay more than $34 million to settle an...more
Last week, researchers at Citizen Lab uncovered sophisticated new spyware that allowed hackers to take complete control of anyone’s iPhone, turning the phone into a pocket-spy to intercept communications, track movements and...more