Risk Management

Trade Turmoil, Rising Global Tensions, Will Increase Cybersecurity Risks

Trade Turmoil, Rising Global Tensions, Will Increase Cybersecurity Risks

Tariffs, trade turmoil, and economic strain will fuel cybercrime, espionage, and hacktivism as companies reduce their cybersecurity budgets and threat actors take advantage of the chaos.

British Columbia Court of Appeal Sets Landmark Privacy and Cybersecurity Precedent

British Columbia Court of Appeal Sets Landmark Privacy and Cybersecurity Precedent

Read how a British Columbia court affirmed damages in a data breach case, setting a privacy and cybersecurity law precedent for compensation without proof of loss.

Clarifying the Legal Standard for Risk Factor Disclosures

Clarifying the Legal Standard for Risk Factor Disclosures

Treating risk factor disclosures as opinions could bring clarity to securities litigation and reduce legal uncertainty for public companies.

Understanding Supply Chain Contracts in a Global Business Environment

Understanding Supply Chain Contracts in a Global Business Environment

Read about how modern supply chain contracts have evolved from an efficiency-based framework to a critical strategic function and the steps to be taken to reduce risk.

AI Whistleblower Response and Its Role in Compliance and Risk Management

AI Whistleblower Response and Its Role in Compliance and Risk Management

Discover how AI whistleblower response tools are transforming compliance programs into proactive, trusted systems that prioritize risk and protect anonymity.

Why Risk Leaders Must Stay the Course Amid Shifting Federal Bribery Enforcement

Why Risk Leaders Must Stay the Course Amid Shifting Federal Bribery Enforcement

Bribery enforcement may be off the federal radar for now, but California and global regulators aren’t backing down. Risk leaders must stay vigilant and compliant.

Mitigating the Risks of the UK Procurement Act

Mitigating the Risks of the UK Procurement Act

Learn more about the UK Procurement Act, which introduces stricter exclusion rules and a public debarment list, raising the stakes for suppliers in public contract bidding.

Exploitation of Windows Vulnerability Puts NTLM Hashes at Risk

Exploitation of Windows Vulnerability Puts NTLM Hashes at Risk

Windows vulnerability CVE-2025-24054 is now actively exploited in phishing attacks, allowing hackers to steal New Technology LAN Manager (NTLM) hashes with minimal user interaction.

UnitedHealth’s Loan Repayment Tactics Face Backlash

UnitedHealth’s Loan Repayment Tactics Face Backlash

UnitedHealth faces backlash over loan repayment demands as healthcare providers and the AMA call for flexible terms amid ongoing financial struggles.

Report Calls for Unified Federal Approach to Cybercrime Data Collection

Report Calls for Unified Federal Approach to Cybercrime Data Collection

A new report urges the US to improve cybercrime data collection and coordination across federal agencies to better understand and combat rising cyber threats.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top