Law School Toolbox Podcast Episode 507: What Do I Need to Do Before the First Day of Law School? (1L Summer Series)
Meet Phil Leslie, Cornerstone Research's New Chief Technology and Innovation Officer
London Partner Roberta Downey Wired for Disputes: Tech, Infrastructure, and the New Frontier of Risk
Law School Toolbox Podcast Episode 505: Breaking ADHD Barriers with the Help of AI (w/Lindsay Scola)
No Password Required: CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things
(Podcast) The Briefing: No CTRL-ALT-DEL For the Server Test
Compliance Tip of the Day – Role of Chatbots in Compliance
5 Key Takeaways | AI and Your Patent Management, Strategy & Portfolio
(Podcast) The Briefing: The Future of TV? A 2025 Digital Media Trends Analysis
The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
Great Women in Compliance: Creating Space to Speak Up: The Story Behind Psst.org
JONES DAY TALKS®: Women in IP – AI and Copyright Law Need-to-Knows
No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
Compliance into the Weeds: The Role of Compliance Going Forward
A Less is More Strategy for Data Risk Mitigation
Third-Party Risk The competitive world of banking struggles to keep up with technological advances, particularly in a regulatory environment.
Investment Opportunities in Italy's Tech Market
The AI Shakeup: New Tech Innovations and the Future of Corporate Law
Regulatory Ramblings: Episode 44 - The Dangers of Non-Technically Trained Lawyers Advising on Technological Matters with Ronald Yu and Donald Day
[Webinar] AI and Data Privacy: Minimizing Risk and Maximizing Opportunity
Google recently issued its June Android Security Bulletin that is designed to patch 34 vulnerabilities, all of which Google designates as high-severity defects. The most serious flaw the patch is designed to fix in the...more
On this episode, we sit down with Mariana Padilla, CEO and co-founder of HACKERverse.ai — an AI-driven platform transforming how cybersecurity solutions are tested and purchased. From her early days in education and...more
SAP Netweaver Visual Composer users are urged to patch a critical vulnerability that attackers are actively exploiting. According to ReliaQuest, which detected the vulnerability, the attacks allow full system compromise...more
WhatsApp users should update the application for vulnerability CVE-2025-30401, which Meta recently patched when WhatsApp was released for Windows version 2.2450.6....more
On March 28, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a Malware Analysis Report (MAR) on RESURGE malware, which is associated with the product Ivanti Connect Secure....more
With the warranty industry evolving in the U.S., companies seeking to modernize conventional warranties by leveraging advanced technologies such as artificial intelligence (AI) are faced with unique regulatory questions and...more
I have practiced law for 40 years with the vast majority as a “construction” lawyer. I have seen great… and bad… construction lawyering, both when representing a party and when serving over 300 times as a mediator or...more
Investment in artificial intelligence (AI) is rising fast. The International Data Corporation projects global spending on AI R&D will reach $632 billion by 2028, more than twice the expected total for 2024....more
The deadline is fast approaching for in-scope financial entities and their ICT service providers to conform to the EU’s new digital operational resilience regulation. With effect from 17 January 2025, a broad range of EU...more
Upgrading critical applications has become a common challenge for corporate IT departments. Software vendors can deploy major releases more quickly because of improvements in coding and testing tools and some tie eligibility...more
In most merger and acquisition (M&A) transactions, the pace of the transaction, focus on the operational and financial performance of the target, and the competition created by multiple potential buyers make it a challenge to...more
The Federal Trade Commission (FTC) recently warned private entities to remediate any ongoing Log4j vulnerabilities present within their networks or face possible enforcement action....more
The National Institute of Standards and Technology (“NIST”) is seeking comments on its second draft of NIST SP 800-161 Rev. 1, “Cyber Supply Chain Risk Management Practices for Systems and Organizations,” published on October...more
Here’s why an optimized IT support capability can maximize reliability and efficiency for your ETRM system. ...more
Here’s how the SAP Community can mitigate the risk of a widespread cybersecurity incident involving their SAP systems....more
Is your ETRM system leaving you exposed to cybersecurity threats?...more
How is the new generation of policy automation management solutions changing the game and solving policy management’s thorniest problems? ...more