from-tgc

Trump Considers Executive Action Targeting State AI Laws

Learn why President Trump may sign an order challenging state AI laws, and using litigation and funding threats to promote a uniform national AI policy.

DoorDash Data Breach Affects User Contact Information

Discover what DoorDash revealed about a data breach impacting user contact details that was traced to a social engineering incident targeting an employee.

AI Reshapes Healthcare Cybersecurity Landscape

Learn how AI is transforming healthcare cybersecurity by enabling faster threat detection, but it is also being used in sophisticated cyberattacks.

Cryptocurrency Mixing Platform Founders Sentenced For Money-Laundering

Learn why Samourai Wallet’s founders were convicted of money laundering by using a cryptocurrency mixing platform that was designed to anonymize transactions.

Ninth Circuit Decision Narrows Constitutional Attacks on NLRB Authority

Learn why a Ninth Circuit case concerning the NLRB matters for constitutional challenges to the Board’s authority in labor disputes.

L3Harris Trade Secrets Case Advances After Former Executive Pleads Guilty

Discover how ExL3Harris trade secrets were sold to Russians, and what the federal plea deal means for companies handling sensitive cyber tools.

Centerview Partners Case Highlights 24 Hour Days For Junior Deal Bankers

Learn how a lawsuit against Centerview Partners revealed the realities of 24-hour days for junior bankers in fast-moving deal environments

Eleventh Circuit Independent Contractor or Employee Dispute

Read why independent contractor versus employee status turned on economic dependence in a recent Eleventh Circuit decision examining insurance adjuster classification.

Fintech’s Role in Shaping Open Source AI

Learn why fintech companies risk losing influence over AI’s future unless they begin contributing to the open source AI ecosystem that is defining industry standards.

Citrix Custom Malware Incident Exposes Coordinated Zero-day Exploitation

Learn why multiple malware incidents involving zero-day exploitation raise serious concerns about attacker sophistication and vendor patch cycles.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top