Leaders in Law: The State of International Trade with Neena Shenai
Understanding FOCI Mitigation
Podcast - Navigating M&A Due Diligence: Safeguarding Security Clearances
An In-Depth Overview of the DCSA
Ask a CFIUS Expert: Is Crypto Spying on Us?
Podcast - Change Condition Packages: Tips for Cleared Contractors
Podcast - Corporate Documents in the Context of Clearances
Decoding the Key Management Personnel Requirements
Navigating Personnel Security Clearances (PCLs)
Wiley's 10 Key Trade Developments: Outbound Investments and CFIUS Review
What Is an FCL and How Do I Obtain One?
AGG Talks: Cross-Border Business - How Foreign Companies Can Protect Their IP and Brand in the U.S.
Emerging Technology in the FY24 NDAA
John Neiman on the Corporate Transparency Act
Wiley's 10 Key Trade Developments: Evolution of Export Controls
FINCast Ep. 39 – State of Russia Sanctions Two Years After the Invasion
AGG Talks: Cross-Border Business - Privacy & Cybersecurity Considerations for Non-U.S. Companies
Video: Making Trade Inclusive for All Americans: A Conversation with SAP's Michelle Trong Perrin-Steinberg
AGG Talks: Cross-Border Business — Episode 7: Trans-Pacific Business: Australia and the U.S. - Part 2
AGG Talks: Cross-Border Business — Episode 7: Trans-Pacific Business: Australia and the U.S. - Part 1
Welcome to our seventh 2024 issue of Decoded - our technology law insights e-newsletter. We have a few events we want to pass along to those interested in technology, but also other areas of law and business. ...more
Just over a year ago, the White House issued its long-awaited National Cybersecurity Strategy, with an emphasis on defending Critical Infrastructure, promoting public and private collaboration, and safeguarding...more
CYBERSECURITY - TechRadar's Cyber Predictions for 2024 are Spot On - Because technology develops so rapidly, and “trends” are fast and furious, it is always hard to predict what the big issues will be for the next...more
California Privacy Protection Agency Releases Revised Regulations - With the effective date less than three months away, and ahead of a Board Meeting on October 28 and 29, the California Privacy Protection Agency released...more
CYBERSECURITY - Cloaked Ursa Using Trusted Online Storage Services to Evade Detection - According to research by Palo Alto’s Unit 42, the most recent campaign by advanced persistent threat Cloaked Ursa (aka APT 20,...more
In the last several weeks, the Executive and Legislative branches of the United States federal government have taken bipartisan measures to defend the country’s infrastructure from the critical national security threat posed...more
In the end, food companies must balance the process efficiencies and controls that data transmission and functionality over the internet provide with the risk of cyberattacks that cripple production. A sizeable chunk of...more
On June 9, 2021, OCR distributed an update to those on its Privacy List sharing links to alerts and resources for addressing the growing number and size of ransomware incidents. One such resource included a White House memo...more
The U.S. Department of Homeland Security (DHS) issued a security directive (Directive) that, for the first time, imposes mandatory cybersecurity requirements on companies in the pipeline industry. ...more
If you live on the East Coast and tried to get gasoline last week, you already know firsthand of the impacts that a cyber incident can wreck on the supply chain. As a result of the Colonial Pipeline cyber incident, a...more
Cognizant Confirms Maze Ransomware Attack - The criminals behind the Maze ransomware [view recent related posts here and here] have gone big and hit Cognizant, one of the largest technology consulting companies in the U.S.,...more
A cyberattack on a single gas compression facility resulted in the shutdown of a natural gas pipeline for two days, according to a recent alert from the US Department of Homeland Security’s Cybersecurity and Infrastructure...more
A new ransomware, dubbed “Ryuk,” has surfaced in the last few weeks and is said to be targeting large organizations in the United States. The attackers behind Ryuk have reportedly made more than $640,000 in just two weeks,...more
In summer 2015, the spies of a foreign country gained access to a private company’s domain name – pick any company you like, or several, since we don’t know which ones or how many. And within those domains, they created false...more