Risk Management

Why We Need to Rethink the Muddled State of AI Governance

Why We Need to Rethink the Muddled State of AI Governance

AI governance is muddled. Frameworks abound, but real risk control starts with how you use AI, not checklists or dashboards. Learn how to flip the approach.

DOJ Settlement Underscores Cybersecurity Risks for Government Contractors

CISA Warns of Growing Threats to SaaS Applications with Weak Security

The Cybersecurity and Infrastructure Security Agency (CISA) warns that attackers are exploiting the security weaknesses of cloud SaaS applications, urging firms to strengthen their defenses.

Ransomware Gangs Adopt Off-the-Shelf Malware for Post-Exploitation Activities

Ransomware Gangs Adopt Off-the-Shelf Malware for Post-Exploitation Activities

Read how ransomware gangs have turned to Skitnet malware for stealthy post-exploitation, enabling deep system control and persistence in targeted attacks.

App Store Has Substantial Fraud Protection, says Apple

App Store Has Substantial Fraud Protection, says Apple

The App Store prevented more than $9 billion in fraudulent transactions and blocked nearly two million risky app submissions, according to Apple.

Ransomware Infrastructure Dismantled in Global Operation

Ransomware Infrastructure Dismantled in Global Operation

A global crackdown dismantles ransomware infrastructure, seizes millions of dollars, and leads to arrests in sweeping international law enforcement operations.

Rethinking TCPA Compliance in the Wake of McLaughlin v. McKesson

Understanding TCPA Compliance in the Wake of McLaughlin v. McKesson

Understand how a SCOTUS ruling may upend agency deference, reshaping Telephone Consumer Protection Act (TCPA) compliance, and why companies using digital marketing should brace for shifting legal standards.

How AI Tools for IP Protection Are Reinventing Patent Monitoring and Enforcement

How AI Tools for IP Protection Are Reinventing Patent Monitoring and Enforcement

Learn how AI tools for intellectual property (IP) protection offer advanced capabilities to detect potential infringement and help prevent it before it escalates.

FTC Shuts Down Debt Collector for Deceptive and Illegal Practices

FTC Shuts Down Debt Collector for Deceptive and Illegal Practices

The FTC issued a permanent ban against a debt collector accused of using threats, false claims, and illegal tactics to collect debts consumers didn’t owe.

Dangerous Ransom Gang Scattered Spider Shifts Focus From UK to US Retail

Dangerous Ransom Gang Scattered Spider Shifts Focus From UK to US Retail

Read how the ransomware group Scattered Spider has been targeting US retail firms using advanced social engineering tactics, posing a significant risk to enterprises with large help desk operations.

Data Provenance: Governing AI Before It Governs You

Data Provenance: Governing AI Before It Governs You

As AI spreads quietly throughout enterprises, data provenance, rather than policy, emerges as the foundation of trustworthy and secure governance.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top