The FBI on Economic Espionage
The Justice Insiders Podcast: Varsity Blues Reversals Turn DOJ Red
[Podcast] Cyber Spotlight: Wiley Tackles White House’s National Cybersecurity Strategy and Other Developments
No Password Required: An FBI Special Agent's Journey from Submarines to Anti-Corruption to Cybersecurity
The New Cold War: Risk, Sanctions, Compliance Episode 23: "Former FBI Acting Director Andrew McCabe”
The Latest from the DOJ Antitrust Division
The Presumption of Innocence Podcast: Episode 7 - Investigative Insights: A Conversation with a Former FBI Agent
DE Under 3: OFCCP AAP Verification Portal 'Rules of Behavior', Vaccination Injunction Updates, & Recent Job Scam Alerts
Cybersecurity: Headlines, Best Practices and Its Evolving Role
Digging Deeper, Episode 1: The Con Queen of Hollywood
Devil in the Details: Gilbert King on Truth and Transparency in the Judicial Process
Compliance Perspectives: The FBI on Why and How to Work with the Office of the Private Sector
This Week in FCPA-Episode 54, the Rubber Match Edition
Last October, the Federal Acquisition Regulation (FAR) Council proposed two new rules, one of which that will influence cyber incident response practices. The scope is limited as it only applies to federal government...more
WHAT: As we previously reported here, on October 3, 2023, the Federal Acquisition Regulatory Council (FAR Council) proposed a pair of major cybersecurity rules intended to implement key parts of President Biden’s May 2021...more
Paige Thompson, a former Amazon Web Services employee, was recently convicted of seven counts of fraud in U.S. District Court for stealing personal data from more than 100 million customers from unsecured accounts stored on...more
You can always count on cyber-criminals and fraudsters to come out of the woodwork when a national crisis occurs. The COVID-19 pandemic has resulted in a multitude of criminal schemes....more
Not to say, I told you so, but around the same time that the Capital One data breach occurred, I was reminding clients that nearly half of all significant data breaches or cyber-incidents occur because of internal actors. ...more
Prior to the Information Age, sensitive papers were stored in file cabinets and drawers. When home computers arrived, information was digitized and moved to hard drives or other electronic media, still possessed by the user....more