Unexpected Paths to IP Law with Dan Young and Colin White
Compliance Needs are Alive and Well: FTC's Recent Enforcement Activity
The LathamTECH Podcast — Getting Deals Done: Tackling Antitrust Challenges in Tech M&A
The Future of Supply Chains: Chris Andrassy on Using AI to Predict & Prevent Disruptions
How IP Can Fuel Your Startup's Growth
Inside a $175M Deal: Tim McLoughlin & Joshua Hayes Live From RDU Startup Week
Daily Compliance News: May 21, 2025, The I Want You Back Edition
Upping Your Game: Episode 3 - Embedded Compliance: From Gatekeeper to Business Enabler
State AG Pulse | Massive Google Settlement Shows AGs Serious About Privacy
Regulatory Ramblings: Episode 69 - Human Intelligence vs. Machine Judgment with Nigel Morris-Cotterill and Patrick Dransfield
From Cell Phones to Tractors: The Right to Repair Movement Drives On — Regulatory Oversight Podcast
Innovation in Compliance: Exploring the Intersection of Compliance, Technology, and AI with Ben Sperry
Upping Your Game: Episode 1 – Meeting Hui Chen’s Challenge
Compliance Tip of the Day: AI and Compliance Education
Sunday Book Review: April 27, 2025, The Books on Business for May Edition
The Briefing: The Future of TV? A 2025 Digital Media Trends Analysis
Innovation in Compliance: Design-Centric Compliance Training with Karen Oddo
Daily Compliance News: April 10, 2025, The Dark Money Corruption Edition
The LathamTECH Podcast — Can RSUs Unlock Employee Equity?
A Guide to SEP: Standard Essential Patents for Tech Startups
The European Union Agency for Cybersecurity (ENISA) has launched the European Vulnerability Database (EUVD), a tool designed to enhance digital security across the EU. The EUVD is available here....more
Two AI heavyweights step into the ring: ChatGPT 4o, the reigning champion of fluency and speed, and the new challenger, ChatGPT 4.5, boasting an upgraded intellect and sharper wit. But which one is truly the best? To find...more
The year 2025 has brought us closer than ever to the dawn of artificial general intelligence, with AI systems now capable of reasoning on par with humans—or even surpassing them in specific domains. In this article, I examine...more
In a win for policyholders, a federal court in Washington recently held that an insurer had a duty to defend a technology company against a vendor’s demand for damages it allegedly suffered when hackers accessed software...more
The Cybersecurity and Infrastructure Security Agency (CISA) unveiled new cyber performance goals aimed at addressing risks to software development and product design in the IT sector. Last week, the Cybersecurity and...more
The EU Cyber Resilience Act (CRA) entered into force on 10 December 2024. The CRA is the first legislation of its kind in the world that aims to enhance the cyber security of products or software with a digital component...more
Juggling paperwork and navigating complex immigration case management and regulations difficult and, at times, can cause unnecessary risk. For any immigration law firm, technology can make all the difference in streamlining...more
On July 28, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) announced that they piloted an Artificial Intelligence (AI)-enabled vulnerability program to help detect and remediate vulnerabilities in the U.S....more
One may be surprised to learn that in 2020, according to a study on intangible assets undertaken by Ocean Tomo (Intangible Asset Market Value Study - Ocean Tomo), 90% of the value of S&P 500–listed companies was accounted for...more
Ask any long-time HR professional what the most significant change of the last few years has been, and they’ll all tell you the same things: the use of HR technology and the investment in human capital. The two are...more
On October 3, 2023, the FAR Council released two long-awaited proposed rules for federal contractor cybersecurity stemming from the Biden Administration’s Cybersecurity Executive Order from May 2021 (Executive Order 14028)....more
Artificial intelligence promises to transform the way we live and work and its impact will undoubtedly stretch to every business sector across the globe. This next generation of technology brings exciting possibilities and...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you if its product is compromised and results in a data...more
Consumer software providers will soon have the option to label their software as compliant with National Institute of Standards and Technology (NIST) standards for software security. On November 1, 2021, NIST published its...more
In November, Tyler wrote about insurance issues raised by both the European Union’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act, which goes into effect on January 1, 2020. California’s...more
On Friday, Sept. 28, 2018, California Governor Jerry Brown signed into law first-in-the-nation legislation requiring that manufacturers include “reasonable security features” on any device that is “capable of connecting to...more
What a great idea! Trusty Consumer Reports has announced that it is collaborating with three cybersecurity firms to “create a new standard that safeguards consumers’ security and privacy—and we hope industry will use...more
We’ve written extensively about the numerous lawsuits, dismissals and settlements surrounding the Illinois Biometric Information Privacy Act (BIPA). The statute, generally speaking, prohibits an entity from collecting,...more
Shortly after the new year, the Federal Trade Commission filed suit in the Northern District of California against D-Link Corporation, a Taiwan-based maker of wireless routers, Internet Protocol (IP) cameras, and software...more