Risk Management

AI and Personal Devices Outpace Security, Evade Access Controls

AI and Personal Devices Outpace Security, Evade Access Controls

Explore how employees and AI tools are bypassing outdated access controls, creating new security, compliance, and oversight challenges for companies.

Phishing Scam On LinkedIn Targets Fintech Executives

Phishing Scam On LinkedIn Targets Fintech Executives

Read how a new phishing campaign on LinkedIn targeting executives uses trust in professional networks to steal Microsoft credentials and session cookies.

Jingle Thief Exploits Cloud Systems to Steal and Monetize Gift Cards

Jingle Thief Exploits Cloud Systems to Steal and Monetize Gift Cards

Learn how Cloud-focused Jingle Thief campaigns exploit retail cloud systems to issue and monetize stolen gift cards, creating complex investigative and compliance risks.

AWS Outage Exposes Internet Fragility, Global Cloud Dependencies

AWS Outage Exposes Internet Fragility, Global Cloud Dependencies

Discover what experts say the AWS outage reveals about concentration risk, and the cascading effects of localized cloud disruptions on global services.

Hackers Target Critical Infrastructure in a Series of Industrial Breaches

Hackers Target Critical Infrastructure in a Series of Industrial Breaches

Dive into how hackers infiltrated Canada’s critical infrastructure and manipulated water, energy, and agriculture systems through exposed industrial controls.

UK Outsourcing Firm Fined £14 Million, Setting Standards for Multi-National GCs

UK Outsourcing Firm Fined £14 Million, Setting Standards for Multinational GCs

Learn why fines against a UK outsourcing firm show multinational GCs the necessity for risk-based testing, SOC accountability, and robust cybersecurity.

Energy Sector Faces Growing Cyber Threats From Hidden Internet Exposures

Energy Sector Faces Growing Cyber Threats From Hidden Internet Exposures

Read why energy firms face growing cyber threats from hidden internet exposures, unmonitored IPv6 assets, and blind spots in traditional security tools.

Understanding the Link Between Emojis and Compliance Risks

Understanding the Link Between Emojis and Compliance Risks

As emojis appear more often in lawsuits and investigations, compliance officers must address the growing link between emojis and compliance risks.

How Agentic AI Can Put Your Company’s Intellectual Property at Risk

How Agentic AI Can Put Your Company’s Intellectual Property at Risk

Understand how bias toward task completion when using agentic AI can put your company’s intellectual property at risk and what you can do about it.

Navigating Legal Risk and Data Governance in the AI-Driven Business World

Navigating Legal Risk and Data Governance in the AI-Driven Business World

Learn how legal risk and data governance intersect as organizations create, license, and deploy datasets in today’s AI-driven business environment.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top