New Virginia "Workplace Violence" Definition and Healthcare Reporting Law: What's the Tea in L&E?
Top challenges with Compliance Management
Episode 377 -- Refocusing Due Diligence on Cartels and TCOs
Daily Compliance News: July 11, 2025, The What is a COI Edition
Regulatory Ramblings: Episode 73 - Geopolitical Risk: Thai Tensions / Sanctions, Tariffs & FCPA Enforcement in Asia
Treating Compliance Like an Asset
When DEI Meets the FCA: What Employers Need to Know About the DOJ’s Civil Rights Fraud Initiative
No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
Compliance Tip of the Day: Lessons from Internal Control Failures
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 241: Fighting Nurse Burnout with Data-Driven Innovation with Dr. Ecoee Rooney of Indicator Sciences
Compliance Tip of the Day: Internal Control Deficiencies
Daily Compliance News: July 8, 2025, The Learning on the Job Edition
#Risk New York Speaker Series – Exploring Future Regulatory Trends and Compliance Strategies with Rory McGrath
FCPA Compliance Report: Stay the Course: Ellen Lafferty on Navigating Anti-Corruption Compliance in 2025
Compliance Tip of the Day: Assessing Internal Controls
Daily Compliance News: July 7, 2025 the Disaster on the River Edition
Multijurisdictional Employers, P2: 2025 State-by-State Updates on Non-Compete/Non-Solicitation Agts
10 For 10: Top Compliance Stories For the Week Ending June 28, 2025
Compliance Tip of the Day: COSO Objective 5 – Monitoring Activities
Episode 30 - Inaugural Episode with Ian Sherr: Compliance Week’s Insights and Reflections from June to July 2025
Tool sprawl is paralyzing enterprise security teams. Learn how to shift from fragile, over-engineered stacks to agile security architectures that accelerate progress....more
Businesses can unknowingly infringe others’ copyrights in all kinds of ways. It’s important for copyright holders to know their rights. It’s also important for those using copyrighted content to be aware of common pitfalls...more
According to a new LayerX report, most users are logging into GenAI tools through personal accounts that are not supported or tracked by an organization’s single sign on policy. These logins to AI SaaS applications are...more
A security researcher found an intentionally placed backdoor in a software library called XZ Utils on April 2. This backdoor allows hackers to hijack secure sessions, or create their own, on devices within an organization's...more
Startups face unique challenges that can impact their success and sustainability. Obstacles such as financial constraints (inadequate funding or limited cash flow) and resource constraints often result in small teams having...more
Here’s how the SAP Community can mitigate the risk of a widespread cybersecurity incident involving their SAP systems....more
Like the many gears that keep machinery running efficiently, an effective Policy Management program involves many moving parts. Trying to wrangle these parts on your own, without a software solution, isn’t really an option...more