Unexpected Paths to IP Law with Dan Young and Colin White
Compliance Needs are Alive and Well: FTC's Recent Enforcement Activity
The LathamTECH Podcast — Getting Deals Done: Tackling Antitrust Challenges in Tech M&A
The Future of Supply Chains: Chris Andrassy on Using AI to Predict & Prevent Disruptions
How IP Can Fuel Your Startup's Growth
Inside a $175M Deal: Tim McLoughlin & Joshua Hayes Live From RDU Startup Week
Daily Compliance News: May 21, 2025, The I Want You Back Edition
Upping Your Game: Episode 3 - Embedded Compliance: From Gatekeeper to Business Enabler
State AG Pulse | Massive Google Settlement Shows AGs Serious About Privacy
Regulatory Ramblings: Episode 69 - Human Intelligence vs. Machine Judgment with Nigel Morris-Cotterill and Patrick Dransfield
From Cell Phones to Tractors: The Right to Repair Movement Drives On — Regulatory Oversight Podcast
Innovation in Compliance: Exploring the Intersection of Compliance, Technology, and AI with Ben Sperry
Upping Your Game: Episode 1 – Meeting Hui Chen’s Challenge
Compliance Tip of the Day: AI and Compliance Education
Sunday Book Review: April 27, 2025, The Books on Business for May Edition
The Briefing: The Future of TV? A 2025 Digital Media Trends Analysis
Innovation in Compliance: Design-Centric Compliance Training with Karen Oddo
Daily Compliance News: April 10, 2025, The Dark Money Corruption Edition
The LathamTECH Podcast — Can RSUs Unlock Employee Equity?
A Guide to SEP: Standard Essential Patents for Tech Startups
The European Union Agency for Cybersecurity (ENISA) has launched the European Vulnerability Database (EUVD), a tool designed to enhance digital security across the EU. The EUVD is available here....more
On March 13, 2025, the Federal Communications Commission’s (“FCC”) Chairman Brendan Carr announced the creation of a Council on National Security (the “Council”) with Adam Chan serving as the Director. This new Council will...more
What if a single compromised credential could silently bring down your entire organization? Our recent threat hunts across Fortune 100 clients suggest that this isn't just a possibility—it's a reality....more
Gone are the days where technological solutions were “nice to have” options to provide us with better access to resources and improved process efficiencies. Nowadays, technological solutions – and specifically those that...more
Editor's Note: In a historic and bold move, the U.S. government has implemented unprecedented sanctions against the Intellexa Consortium and its key figures for their roles in deploying spyware that jeopardizes privacy and...more
BioPlus Specialty Pharmacy Faces Lawsuit Over Healthcare Data Breach - "Florida-based BioPlus Specialty Pharmacy allegedly failed to safeguard PII and notify patients of a healthcare data breach that impacted 350K, the...more
What: On November 16, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) released Federal Government Cybersecurity Incident and Vulnerability Playbooks as part of the Biden Administration’s efforts to improve...more
The Cybersecurity and Infrastructure Security Agency (CISA) issued a sweeping binding directive to federal agencies to patch hundreds of cybersecurity vulnerabilities that are considered major risks for cyber actors to cause...more
Report on Patient Privacy 21 no. 9 (September, 2021) - As ransomware attacks become epidemic and breaches get larger, the Biden administration is partnering with private industry to bolster security and education in an...more
How to ensure emerging technologies help rather than hurt your organization - Technology represents the classic double-edged sword for compliance and ethics professionals. When properly utilized, it can be a vital tool,...more
Megan Brown sits down with one of Wiley’s newest attorneys, Sam Kaplan, former Assistant Secretary for Cyber, Infrastructure, Risk and Resilience Policy at the U.S. Department of Homeland Security (DHS), to discuss the...more
In the eighth in a series of 12 Jones Day Presents: Blockchain videos, partner Jay Johnson provides examples of existential, ordinary, and human error threats to blockchains that may result in data privacy breaches and...more
Technology and the critical infrastructure that support our personal pursuits and business operations are ripe targets for cyberattacks. In particular, the electrical grid that transmits electricity from its point of...more
When it comes to cyberattack targets, many think of retailers and associated credit card transactions or customer information, or perhaps healthcare providers with their ever-increasing storage and transmission of electronic...more
On October 12, 2015, Nossaman and UC Irvine hosted a Cyber Symposium at the City Club in Los Angeles. The event included four panels of Nossaman lawyers, UCI professors, and private professionals who are experts in the areas...more