Risk Management

Reduce Risk With a Structured Vendor Onboarding Process

Reduce Risk With a Structured Vendor Onboarding Process

A structured vendor onboarding process helps reduce risk early in the vendor lifecycle. Learn about the best practices that will help protect your legal department.

Trade Turmoil, Rising Global Tensions, Will Increase Cybersecurity Risks

Trade Turmoil, Rising Global Tensions, Will Increase Cybersecurity Risks

Tariffs, trade turmoil, and economic strain will fuel cybercrime, espionage, and hacktivism as companies reduce their cybersecurity budgets and threat actors take advantage of the chaos.

British Columbia Court of Appeal Sets Landmark Privacy and Cybersecurity Precedent

British Columbia Court of Appeal Sets Landmark Privacy and Cybersecurity Precedent

Read how a British Columbia court affirmed damages in a data breach case, setting a privacy and cybersecurity law precedent for compensation without proof of loss.

Clarifying the Legal Standard for Risk Factor Disclosures

Clarifying the Legal Standard for Risk Factor Disclosures

Treating risk factor disclosures as opinions could bring clarity to securities litigation and reduce legal uncertainty for public companies.

Understanding Supply Chain Contracts in a Global Business Environment

Understanding Supply Chain Contracts in a Global Business Environment

Read about how modern supply chain contracts have evolved from an efficiency-based framework to a critical strategic function and the steps to be taken to reduce risk.

AI Whistleblower Response and Its Role in Compliance and Risk Management

AI Whistleblower Response and Its Role in Compliance and Risk Management

Discover how AI whistleblower response tools are transforming compliance programs into proactive, trusted systems that prioritize risk and protect anonymity.

Why Risk Leaders Must Stay the Course Amid Shifting Federal Bribery Enforcement

Why Risk Leaders Must Stay the Course Amid Shifting Federal Bribery Enforcement

Bribery enforcement may be off the federal radar for now, but California and global regulators aren’t backing down. Risk leaders must stay vigilant and compliant.

Mitigating the Risks of the UK Procurement Act

Mitigating the Risks of the UK Procurement Act

Learn more about the UK Procurement Act, which introduces stricter exclusion rules and a public debarment list, raising the stakes for suppliers in public contract bidding.

Exploitation of Windows Vulnerability Puts NTLM Hashes at Risk

Exploitation of Windows Vulnerability Puts NTLM Hashes at Risk

Windows vulnerability CVE-2025-24054 is now actively exploited in phishing attacks, allowing hackers to steal New Technology LAN Manager (NTLM) hashes with minimal user interaction.

UnitedHealth’s Loan Repayment Tactics Face Backlash

UnitedHealth’s Loan Repayment Tactics Face Backlash

UnitedHealth faces backlash over loan repayment demands as healthcare providers and the AMA call for flexible terms amid ongoing financial struggles.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top