From Cell Phones to Tractors: The Right to Repair Movement Drives On — Regulatory Oversight Podcast
Innovation in Compliance: Exploring the Intersection of Compliance, Technology, and AI with Ben Sperry
Upping Your Game: Episode 1 – Meeting Hui Chen’s Challenge
Compliance Tip of the Day: AI and Compliance Education
Sunday Book Review: April 27, 2025, The Books on Business for May Edition
The Briefing: The Future of TV? A 2025 Digital Media Trends Analysis
Innovation in Compliance: Design-Centric Compliance Training with Karen Oddo
Daily Compliance News: April 10, 2025, The Dark Money Corruption Edition
The LathamTECH Podcast — Can RSUs Unlock Employee Equity?
A Guide to SEP: Standard Essential Patents for Tech Startups
FINCast Ep. 40 – 21st Century Financial Warfare: Technology, Economy, & National Security
Compliance Tip of the Day: Real-Time Compliance Scoring
Innovation in Compliance: Navigating AI Governance in 2025 with Christine Uri
2025 Perspectives in Private Equity: AI & Technology
AGG Talks: Women in Tech Law Podcast - Episode 5: How the Tech Industry Can Monitor Regulatory Changes Under the Trump Administration
The Growing Role of State AGs in AI Regulatory & Enforcement Issues — The Good Bot Podcast
Investment Opportunities in Italy's Tech Market
Legal Alert | Japan is Primed for Increased Foreign Direct Investment
Spotlight on Lightmatter, the Photonic (Super) Computing Company Ready to Power the AI Revolution
Wiley's 10 Key Trade Developments: Outbound Investments and CFIUS Review
xThe cybersecurity community has witnessed a significant development with the recent compromise of LockBit’s operational infrastructure, providing extraordinary visibility into one of the most sophisticated...more
Welcome to our fourth issue of 2025 of Decoded - our technology law insights e-newsletter. We hope you enjoy this issue and thank you for reading. Sector by Sector: How Data Breaches are Wrecking Bottom Lines - “Data...more
Welcome to your monthly rundown of all things cyber, privacy, and technology, where we highlight all the happenings you may have missed. ...more
A major cyberattack on Jaguar Land Rover (JLR) has cast a spotlight on the persistent threat of ransomware targeting global corporations. The HELLCAT ransomware group is behind this latest breach, exposing internal documents,...more
Welcome to our second issue of 2025 of Decoded - our technology law insights e-newsletter. For those of you with an interest in the Corporate Transparency Act, Brienne Marco and Joe Unger report that the recent injunction...more
Welcome to our seventh 2024 issue of Decoded - our technology law insights e-newsletter. We have a few events we want to pass along to those interested in technology, but also other areas of law and business. ...more
Using AI to Build Cyber Resilience for Critical Infrastructure - "Cyber resilience serves as a literal survival strategy, offering a framework to detect threats, understand attacks, recover swiftly, and adapt to...more
In this week’s News of Note, ransomware attacks break records and wipe data for a majority of a cloud provider’s customers, while one RaaS case delivers useful details about cybercriminal techniques and tactics. Also, the...more
You may be Entitled to Financial Compensation…for Your Data - “Without all of our writings and photos that AI companies are using to train their models, they would have nothing to sell.” Why this is important: This...more
In an era where our lives are ever more intertwined with technology, the security of digital platforms is a matter of national concern. A recent large-scale cyberattack affecting several U.S. federal agencies and numerous...more
Cyber Resilience Programs Falling Short on Preparing Workers for a Crisis- “At two-thirds of organizations, there is a fear that almost all employees, 95%, will not understand how to recover following a cyberattack.” ...more
North Carolina Power Outage Points to Homeland Security Long-Documented Threats to US Power Grid - “Moore County blackouts serve as reminder that nation’s electricity infrastructure could be vulnerable targets for domestic...more
From advancements in quantum teleportation to the possibility of intelligent digital twins and claims that Google’s AI is sentient, this week’s News of Note has sci-fi appeal, and more....more
Universities Share Lessons Learned from Ransomware Attacks "According to a recent Sophos poll of IT professionals, 44 percent of educational institutions suffered ransomware attacks in 2020, and 58 percent of those hit...more
Companies continue to see headlines about cyberattacks, but manufacturing companies, specifically, have become more targeted in the last few years. In the most recent issue of The Illinois Manufacturer, Molly Arranz and Sofia...more
Where We Stand - This year kicks off against the backdrop of the security flaw found in Log4j, a system-logging code library widely used in applications and services across the Internet. In the aftermath of this crisis, a...more
Assignment and Recordation of Patent Ownership Rights - A patent has the attributes of intangible personal property: it can be sold or mortgaged; it may be bequeathed by a will; and it may pass to the heirs of a deceased...more
Report on Patient Privacy 21 no. 9 (September, 2021) - As ransomware attacks become epidemic and breaches get larger, the Biden administration is partnering with private industry to bolster security and education in an...more
We invite you to attend McDermottTech 2021, a virtual conference exploring the latest global trends impacting the technology industry. Please join us for this complimentary program on September 21, 2021, for the opportunity...more
The FBI has reported a 400 percent increase in cyber-attacks in 2020 – and, according to some reports, Ransomware makes up about 85 percent of those attacks. Ransomware is one of the most potentially damaging types of...more
Court Redirects Most Ring LLC Privacy Litigation Plaintiffs to Arbitration "In the complaint, the plaintiffs alleged that Ring’s security systems were defectively designed without sufficient security protocols, leaving...more
PA Health Dept Sued; Investigation Looms, After Contact Tracing Breach "The PA health dept. is being sued, after employees of its vendor Insight Global set up an unsecured channel to share COVID-19 contact tracing data,...more
How to ensure emerging technologies help rather than hurt your organization - Technology represents the classic double-edged sword for compliance and ethics professionals. When properly utilized, it can be a vital tool,...more
With every new technology, there are security risks. Blockchain is no exception. The recently published McAfee Blockchain Threat Report by McAfee’s Advanced Threat Research team analysts explains the current threats against...more
The Ugly of Technology — Ransomware Technology is fundamentally good and helpful to us; but, like so many things in our modern world, there is the good…the bad…and the ugly. In October 2016, what might have been the largest...more