Upping Your Game: Episode 1 – Meeting Hui Chen’s Challenge
Compliance Tip of the Day: AI and Compliance Education
Sunday Book Review: April 27, 2025, The Books on Business for May Edition
The Briefing: The Future of TV? A 2025 Digital Media Trends Analysis
Innovation in Compliance: Design-Centric Compliance Training with Karen Oddo
Daily Compliance News: April 10, 2025, The Dark Money Corruption Edition
The LathamTECH Podcast — Can RSUs Unlock Employee Equity?
A Guide to SEP: Standard Essential Patents for Tech Startups
FINCast Ep. 40 – 21st Century Financial Warfare: Technology, Economy, & National Security
Compliance Tip of the Day: Real-Time Compliance Scoring
Innovation in Compliance: Navigating AI Governance in 2025 with Christine Uri
AGG Talks: Women in Tech Law Podcast - Episode 5: How the Tech Industry Can Monitor Regulatory Changes Under the Trump Administration
The Growing Role of State AGs in AI Regulatory & Enforcement Issues — The Good Bot Podcast
Investment Opportunities in Italy's Tech Market
Legal Alert | Japan is Primed for Increased Foreign Direct Investment
Spotlight on Lightmatter, the Photonic (Super) Computing Company Ready to Power the AI Revolution
Wiley's 10 Key Trade Developments: Outbound Investments and CFIUS Review
Wiley's 10 Key Trade Developments: The CHIPS Act and Inflation Reduction Act (IRA)
Emerging Technology in the FY24 NDAA
AI Around the Globe: What to Know in 2024
AI is technology that enables computers to simulate human intelligence and problem-solving skills, whereas deepfake is synthetic media that has been digitally manipulated to replace and mimic one person’s likeness. AI has...more
As the holiday shopping season kicks into high gear, it also becomes a prime opportunity for cybercriminals to target retailers, their suppliers, and their customers. As The Hacker News reports, criminal use of artificial...more
This year, our DLA Piper Tech Index is global, and captures the views of an even wider cross section of organizations working in the technology space. The report itself contains fascinating and granular findings on a range of...more
Gone are the days where technological solutions were “nice to have” options to provide us with better access to resources and improved process efficiencies. Nowadays, technological solutions – and specifically those that...more
MIT Report Details New Cybersecurity Risks - “Cloud misconfigurations, more sophisticated ransomware, and vendor exploitation attacks are contributing to rising cyberattacks.” Why this is important: Worldwide spending...more
Using AI to Build Cyber Resilience for Critical Infrastructure - "Cyber resilience serves as a literal survival strategy, offering a framework to detect threats, understand attacks, recover swiftly, and adapt to...more
A recent deepfake scam has rocked the financial landscape of Hong Kong, demonstrating the extreme lengths to which cybercriminals are willing to go to defraud unsuspecting victims. This sophisticated scheme, which saw...more