Our Latest News, Case Studies, Webinars & More

Key Takeaways from Our London Roundtable: Human Rights Due Diligence in Pharma
We recently hosted a pharma-focused roundtable in partnership with Norton Rose Fulbright at their London office, bringing together senior risk and compliance professionals from across the life sciences industry. [...]
Economic Pressure, Perverse Incentives, and the Growing Importance of Third-Party Risk Management
The ongoing conflict in Iran has added fresh volatility to an already fragile global economic outlook in 2026, compounding uncertainty around tariffs, sanctions, and wider geopolitical tensions. [...]
Top 5 Takeaways from Our UK Anti-Bribery & Corporate Crime Webinar
In our recent webinar on the evolving UK anti-bribery and corporate crime landscape, we explored a reality that many compliance leaders are currently grappling with: SFO enforcement may [...]
What Should Businesses Consider When Re-Entering a High Risk Jurisdiction?
Following the early January 2026 capture of Venezuelan President Nicolás Maduro, the US and Venezuelan governments have been taking steps to encourage new investment.[...]
Recognition That Reflects the Reality of Modern Third-Party Risk
We’re pleased to share that Ethixbase360 has been recognized as a G2 Best Software Award winner in the Governance, Risk & Compliance (GRC) category — an award from G2 [...]
Top 5 Takeaways from Our CSDDD Webinar: What Organizations Should Be Paying Attention To
The conversation around the EU Corporate Sustainability Due Diligence Directive (CSDDD) continues to evolve, and as highlighted during our recent webinar featuring Nicola Bonucci, organizations[...]
Sanctions Risk and Reputational Exposure in the Mid-Market
The U.S. Department of Commerce’s Bureau of Industry and Security (BIS) has long used the Entity List to restrict exports to organizations and individuals engaged in activities contrary to U.S. [...]
The Rise of Third-Party Cyber Breaches and How to Reduce Your Organization’s Exposure
As digital ecosystems expand and organizations rely on increasingly complex networks of external providers, third-party cyber incidents are fast becoming the norm rather than the exception.[...]