Risk Management

Compliance Considerations for Updated SEC Marketing Rule Guidance

Compliance Considerations for Updated SEC Marketing Rule Guidance

Read more about the Securities and Exchange Commission (SEC) Marketing Rule updates that clarify performance data use in ads, easing compliance burdens for advisers while reinforcing disclosure expectations.

Latest CTA Update: FinCEN Narrows Corporate Transparency Act Scope

Latest CTA Update: FinCEN Narrows Corporate Transparency Act Scope

What’s next for CTA compliance? Learn more about FinCEN’s new rule that narrows the Corporate Transparency Act, exempting most US entities from reporting.

Understanding the Consumer Financial Protection Bureau Funding Crossroads

Federal Contractor Minimum Wage and Labor Policies Continue to Shift: Key Implications for Compliance

Read how President Trump rescinded the federal contractor minimum wage EO, sparking compliance challenges amongst shifting pay and regulatory requirements.

How AI, Data, and Collaboration Are Reshaping Legal Ops in 2025

How AI, Data, and Collaboration Are Reshaping Legal Ops in 2025

AI, data, and collaboration are redefining legal ops in 2025. Learn how they are driving efficiency and strategy for corporate legal departments.

A Structured Three-Phase Approach to Vendor Management

A Structured Three-Phase Approach to Vendor Management

Discover how legal ops can use a structured three-phase approach to vendor management through engagement, enforcement, and an examination of data-driven insights.

OIG Clarifies Safe Harbor Compliance in Anti-Kickback Violations Advisory

FTC Enforcement in Digital Health: Past Trends and Future Implications

FTC enforcement of digital health data is evolving, but scrutiny remains high. Read how companies must ensure compliance to avoid penalties and reputational risks.

Hackers Still Exploiting Google Calendar in Phishing and Malware Attacks

Hackers Still Exploiting Google Calendar in Phishing and Malware Attacks

Learn more about how hackers use Google Calendar to spread malware through fake invites and phishing links, tricking users into revealing personal information.

Browser Extensions Lurked for Years, Exposing Millions to Malware

North Korean Hacker Group Uses ClickFix Tactics in Targeted Espionage

Microsoft warns that North Korean group Kimsuky is using ClickFix tactics to target government and NGO officials through spear-phishing attacks.

Snailmail Is the Oldest New Ransomware Threat

Snailmail Is the Oldest New Ransomware Threat

Read how scammers are using snailmail to send fake ransomware demands, claiming that data breaches have occurred and demanding Bitcoin payments.

Beyond Phishing: The Rise of Mobile-Specific Cyber Threats

Beyond Phishing: The Rise of Mobile-Specific Cyber Threats

Hackers are ditching traditional phishing for mobile-first attacks like smishing, quishing, and Wi-Fi phishing. Are businesses ready for the new threat landscape?

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top