Insights
Learn about significant trends, explore proprietary data, and read expert analysis on the global outlook.

April 5, 2026
Sham Transactions and the New OFAC Playbook: What Companies Need to Know
OFAC's March 2026 advisory targets sham transactions designed to disguise sanctioned persons' continuing interest in assets.
Read More
March 31, 2026
Diverging Sanctions Regimes: Navigating the U.S.–EU–UK Compliance Gap on Russia
U.S., EU, and UK sanctions on Russia are increasingly diverging in scope, enforcement, and exemptions.
Read More
March 17, 2026
The Shadow Fleet Problem: How Maritime Sanctions Evasion Creates Compliance Risk on Land
An aging fleet of tankers is moving sanctioned oil using spoofed tracking data, flag-switching, and layered shell companies.
Read More
March 10, 2026
From Iran to Critical Infrastructure: Lessons from the 2026 Cyber Swarm
The February 2026 U.S.–Israel strikes on Iran triggered an immediate, dispersed cyber campaign against critical infrastructure.
Read More
March 3, 2026
The Compliance Officer as National Security Asset: A Role That's Evolving Fast
Compliance professionals are increasingly embedded in national security teams as geopolitical volatility reshapes regulatory expectations.
Read More
February 24, 2026
Nation-State Actors Are Pre-Positioning Inside OT Networks. Here's What That Means.
PRC-linked actors are embedding persistent access inside U.S. critical infrastructure — not for immediate exploitation, but for future leverage during a crisis.
Read More
February 17, 2026
Geopolitics Is No Longer Background Noise: The Case for Corporate Geostrategy
With roughly 60 percent of FTSE 100 returns now driven by geopolitical and macro forces, companies can no longer afford to treat geopolitical risk as a line...
Read More
February 10, 2026
Critical Minerals, Energy Security, and the New Geopolitics of Supply Chains
Competition for lithium, cobalt, and other critical minerals is intensifying as governments pursue economic sovereignty through export controls and onshoring...
Read More
January 27, 2026
AI as Both Sword and Shield: The Dual-Use Challenge Reshaping Cybersecurity
AI agents can now autonomously probe systems, chain vulnerabilities, and adapt attack strategies in real time.
Read More
