Risk Management

Navigating Compensation and Benefits After an Employee Departure

Navigating Compensation and Benefits After an Employee Departure

Explore why handling compensation, benefits, and compliance after an employee departure requires careful coordination to avoid penalties and legal exposure.

Using Compliance to Address Antitrust Risks in Procurement

Using Compliance to Address Antitrust Risks in Procurement

Antitrust risks in procurement are rising as whistleblower rewards expand and regulators target anticompetitive rules. Compliance must adapt.

Americans with Disabilities Act Compliance and Premises Liability Risks

Americans with Disabilities Act Compliance and Premises Liability Risks

Learn how compliance gaps around the Americans with Disabilities Act expose property owners to costly premises liability risks, lawsuits, and reputational harm.

Preparing for the Operational Risk of a Government Shutdown

Preparing for the Operational Risk of a Government Shutdown

Organizations must prepare for potential disruptions as a government shutdown approaches, with proactive planning being critical to minimizing operational and financial risks.

Oregon Supreme Court Clarifies Coverage for Construction Defect Damage

Oregon Supreme Court Clarifies Coverage for Construction Defect Damage

Discover how the Oregon Supreme Court decided when construction defect damage qualifies as an “occurrence” under commercial general liability policies.

Emerging Botnet Threat Exploits Exposed Docker APIs

Emerging Botnet Threat Exploits Exposed Docker APIs

Learn how attackers exploit Docker APIs with evolving malware that blocks access, spreads autonomously, and lays groundwork for a complex botnet.

Email Security Flaw Exposes Zero-Click Vulnerability

Email Security Flaw Exposes Zero-Click Vulnerability

Discover why Punycode can let attackers hijack accounts through email systems without user interaction, exploiting a zero-click vulnerability.

The Overlooked Threat: How Legacy Building Systems Pose New Cyber Risk

The Overlooked Threat: How Legacy Building Systems Pose New Cyber Risk

Systems once seen as isolated and harmless are now networked. Where there’s connectivity, there’s risk—especially with legacy building systems.

Disaster Risk Planning: Safeguarding Employees During a Crisis

Disaster Risk Planning: Safeguarding Employees During a Crisis

Learn why employers must treat disaster risk planning as ongoing, protecting employees across all phases of crisis to reduce legal exposure and speed recovery.

Cybersecurity Maturity Model Certification Finalized: Key Compliance Obligations for Defense Contractors

Cybersecurity Maturity Model Certification Finalized: Key Compliance Obligations for Defense Contractors

The DoD’s final rules on Cybersecurity Maturity Model Certification (CMMC) reshape contractor obligations. Compliance teams must prepare for phased enforcement.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top