from-tgc

New Financial Incentives For Whistleblowers

New Financial Incentives For Whistleblowers

Discover why new financial incentives for whistleblowers may call for enhanced internal investigation procedures to handle a flood of allegations.

Can Salary Be a Surrogate for FLSA Overtime Exemptions?

Can Salary Be a Surrogate for FLSA Overtime Exemptions?

 Understand why salary as a stand-in for Fair Labor Standards AUnderstand why salary as a stand-in for FLSA overtime exemptions (executive, administrative, or professional) could split the US Supreme Court.

Key Compliance Requirements for EU Regulatory Changes in 2024 and Beyond

Key Compliance Requirements for EU Regulatory Changes in 2024 and Beyond

Stay ahead of EU regulatory changes with insights on key compliance directives, from sustainability reporting to AI oversight, impacting businesses in 2024.

Legal and Compliance Strategies for Managing Risks in Renewable Energy Projects

Legal and Compliance Strategies for Managing Risks in Renewable Energy Projects

Discover how developers can manage the evolving risks in renewable energy projects, from supply chain challenges to compliance with the Inflation Reduction Act.

How Canada's Cybersecurity Strategy Addresses Remote Work, Aging Infrastructure

How Canada’s Cybersecurity Strategy Addresses Remote Work, Aging Infrastructure

Discover how Canada’s cybersecurity strategy will make hybrid work more secure and create a security operations center to monitor cloud-connected devices.

Supply Chain Cyberattacks Leverage Trust Relationships Between Companies

Supply Chain Cyberattacks Leverage Trust Relationships Between Companies

Learn how supply chain cyberattacks use the trust between companies that share software to find and exploit weaknesses in their mutual cybersecurity.

Massive Increase In Cyber Threats Fueled By Use of Unsecured Work-From-Home Devices

Massive Increase In Cyber Threats Fueled By Use of Unsecured Work-From-Home Devices

Read how cyber threats have risen 400% since the pandemic, mostly because of unsecured work-from-home devices and networks.

Supply Chain Cybersecurity Rule One: Take a Hard Look at Your Suppliers

Supply Chain Cybersecurity Rule One: Take a Hard Look at Your Suppliers

Read how supply chain cybersecurity isn’t just about defenses. Professor SK Jeong says vulnerabilities often lie with your suppliers.

CrowdStrike Outage Highlights the Vulnerability of Digital Ecosystems

CrowdStrike Outage Highlights the Vulnerability of Digital Ecosystems

Explore how the use of AI in a company’s system amplifies the vulnerability of digital ecosystems and networks, as exemplified by the CrowdStrike incident.

Complying with the EU AI Act

Preventing GenAI Hallucinations in Your Legal Department

Learn about preventing genAI hallucinations in your legal department and mitigate risks such as factual inaccuracies and sentence contradictions.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top