Risk Management

FEOC Rules and Clean Energy Compliance Under the OBBBA

FEOC Rules and Clean Energy Compliance Under the OBBBA

Discover why clean energy developers face heightened FEOC legal risk and compliance challenges under the One Big Beautiful Bill Act’s new rules.

Tracking Money Flow Through Crypto Platforms in “Pig Butchering” Scams

Tracking Money Flow Through Crypto Platforms in “Pig Butchering” Scams

Read why money flows through crypto platforms has become key to disrupting “pig butchering” scams and recovering stolen assets worldwide.

Managing Legal and Insurance Risks When Using AI in Hiring

Managing Legal and Insurance Risks When Using AI in Hiring

Learn more about how employers face new regulatory, discrimination, and insurance challenges as the use of AI in hiring expands.

Understanding the Ethical Risks of AI: How Delegation Can Encourage Dishonest Behavior

Understanding the Ethical Risks of AI: How Delegation Can Encourage Dishonest Behavior

New research reveals that the ethical risks of AI include increasing dishonesty when employees delegate tasks to machines, raising governance concerns.

Consumer Product Safety Commission Turns to AI for Proactive Oversight

Consumer Product Safety Commission Turns to AI for Proactive Oversight

Discover how the Consumer Product Safety Commission (CPSC) plans to use AI and predictive analytics to detect risks earlier, reshaping compliance expectations.

$15B in Bitcoin Seized in Crackdown on Alleged Prince Group Scam

$15B in Bitcoin Seized in Crackdown on Alleged Prince Group Scam

Learn how the DOJ and the UK’s seizure of $15B in bitcoin is linked to a massive Prince Group scam that exploited imprisoned forced-labor victims.

How Vendor Due Diligence Protects Third-Party Relationships

How Vendor Due Diligence Protects Third-Party Relationships

Delve into vendor due diligence and how it combines risk data, automation, and human insight to keep complex third-party networks secure.

Cross-Border Data

From Terabytes to Timelines: How GCs Can Gain Control of Cross-Border Data

SPONSORED BY IDISCOVERY SOLUTIONS: Learn about a datacenter-style solution that ensures compliance with regional laws and standards.

Contracting for Quantum-as-a-Service For Legal Organizations

Contracting for Quantum-as-a-Service For Legal Organizations

Read how computing advances are shaping Quantum-as-a-Service agreement negotiations as companies confront new risks, pricing models, and compliance obligations.

Unknown Attackers Breach Cybersecurity Company F5's Networks, Steal Customer Data

Unknown Attackers Breach Cybersecurity Company F5’s Networks, Steal Customer Data

Discover how hackers infiltrated cybersecurity company F5 Networks, stealing source code and customer data in a sophisticated, government-backed breach.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top