Risk Management

OIG Clarifies Safe Harbor Compliance in Anti-Kickback Violations Advisory

OIG Clarifies Safe Harbor Compliance in Anti-Kickback Violations Advisory

A recent OIG opinion clarifies how strict adherence to safe harbor rules can shield companies from anti-kickback violations tied to physician ownership.

Information Governance vs. Data Governance: Why the Difference Matters

Information Governance vs. Data Governance: Why the Difference Matters

Learn why confusing the roles of information governance and data governance can lead to serious misalignment, inefficiencies, and compliance risks.

Staying Ethical and Maintaining Conflict-of-Interest Compliance in the Season of Giving

Staying Ethical and Maintaining Conflict-of-Interest Compliance in the Season of Giving

Learn how to maintain conflict-of-interest compliance this holiday season with guidance on transparency, gift value, and ethical decision-making.

E-Verify Compliance as a Growing False Claims Act Risk for Contractors

E-Verify Compliance as a Growing False Claims Act Risk for Contractors

 Discover why DOJ actions show E-Verify compliance is now a frontline False Claims Act (FCA) risk and contractors need disciplined responses to avoid exposure.

AI and Personal Devices Outpace Security, Evade Access Controls

AI and Personal Devices Outpace Security, Evade Access Controls

Explore how employees and AI tools are bypassing outdated access controls, creating new security, compliance, and oversight challenges for companies.

Phishing Scam On LinkedIn Targets Fintech Executives

Phishing Scam On LinkedIn Targets Fintech Executives

Read how a new phishing campaign on LinkedIn targeting executives uses trust in professional networks to steal Microsoft credentials and session cookies.

Jingle Thief Exploits Cloud Systems to Steal and Monetize Gift Cards

Jingle Thief Exploits Cloud Systems to Steal and Monetize Gift Cards

Learn how Cloud-focused Jingle Thief campaigns exploit retail cloud systems to issue and monetize stolen gift cards, creating complex investigative and compliance risks.

AWS Outage Exposes Internet Fragility, Global Cloud Dependencies

AWS Outage Exposes Internet Fragility, Global Cloud Dependencies

Discover what experts say the AWS outage reveals about concentration risk, and the cascading effects of localized cloud disruptions on global services.

Hackers Target Critical Infrastructure in a Series of Industrial Breaches

Hackers Target Critical Infrastructure in a Series of Industrial Breaches

Dive into how hackers infiltrated Canada’s critical infrastructure and manipulated water, energy, and agriculture systems through exposed industrial controls.

UK Outsourcing Firm Fined £14 Million, Setting Standards for Multi-National GCs

UK Outsourcing Firm Fined £14 Million, Setting Standards for Multinational GCs

Learn why fines against a UK outsourcing firm show multinational GCs the necessity for risk-based testing, SOC accountability, and robust cybersecurity.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top