Risk Management

Department of Energy Releases New Supply Chain Cybersecurity Principles

Department of Energy Releases New Supply Chain Cybersecurity Principles

Explore these supply chain cybersecurity best practices formulated by the Department of Energy to prevent disruption of critical infrastructure.

Provider Consolidation Is Driving Litigation In Healthcare Data Breach Lawsuits

Provider Consolidation Is Driving Litigation In Healthcare Data Breach Lawsuits

Read how provider consolidation ups the ante for healthcare data breach lawsuits and why settlement is the preferred option for resolution.

CO2 Emissions

Companies Face Rising Lawsuits Over Plastic Pollution and Greenwashing Claims

Read why companies are under fire as lawsuits surge over plastic pollution and greenwashing, with increasing scrutiny on product misrepresentations.

Greenwashing Litigation Focused On Carbon Neutrality Claims Increasing

Greenwashing Litigation Focused On Carbon Neutrality Claims Increasing

Read how corporate statements on carbon neutrality by Delta Airlines prompted greenwashing litigation citing the purchase of carbon credits.

Cybersecurity Budgets Coming Under Pressure in Tough Macro Climate

Cybersecurity Conference Stresses Cloud Storage Service Vulnerabilities

Explore expert insights into the latest security issues and cloud storage service vulnerabilities in Amazon Web Services and other providers.

What Will Overturning The Chevron Precedent Mean For Securities Regulatory Initiatives?

What Will Overturning The Chevron Precedent Mean For Securities Regulatory Initiatives?

Learn why overturning the Chevron precedent is a fundamental change in administrative law and will deeply affect the judicial review of securities rules.

Five Smart Tips for Legal Operations Transformation

Aligning Global Sustainability Reporting Standards

Discover the significance of aligning global sustainability reporting standards with the publication of an interoperability document.

Under the Radar Cyberattacks

Cyber Breaches Expose Vulnerabilities In Online Transactions

 Discover how cyber breaches expose vulnerabilities in cross-border transactions and why advanced security protocols safeguard vital financial information.

Understanding the Difference Between Data Retention and Data Preservation

How Unified Compliance Technology Can Keep Errors from Escalating into Risks

Learn how unified compliance technology helps organizations prevent minor oversights from becoming major risks reporting, training, and risk management.

Understanding the Difference Between Data Retention and Data Preservation

The Growing Legal Perils for Chief Information Security Officers

Chief information security officers face unprecedented legal risks. Learn how to navigate scrutiny and avoid being targeted in the fallout of a cyberattack.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top