The LathamTECH Podcast — Turning a London Eye Toward International Tech Growth
The Rise of OTAs in Defense Contracting: Opportunities, Risks, and What Contractors Need to Know
Podcast - Navigating the Updated SF-328 Form
Diversifying Your Contract Pipeline by Maximizing Opportunities through the DOD’s Mentor Protégé Program
Podcast - The "I" in FOCI and AI: Innovation, Intelligence, Influence
Podcast - Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector, Part 2
Episode 345 -- Raytheon Pays $950 Million to Resolve Fraud, FCPA, ITAR and False Claims Act Violations
Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector
Understanding FOCI Mitigation
Cybersecurity Insights: Updates on CMMC Implementation and CUI Identification
Protecting Our Nation’s Data: Cybersecurity Compliance for Government Contractors
Podcast - The State of Contractor Cybersecurity with Katie Arrington
What Do the Newly Released CMMC 2.1 Documents Mean?
Season 2 Episode 5- Defense Trade Down Under
Podcast - Third-Party Assessments and NIST SP 800-171
Third-Party Assessments and NIST SP 800-171
[Podcast] NSA Cybersecurity Services for Defense Contractors
Podcast: A Deep Dive into Consortia with Dan Sennott and Stephanie Halcrow
Federal Contracting Overseas: Insider Tips for Ensuring Compliance with Host Country Laws
Cybersecurity and 889 Compliance in 2021: What Government Contractors Need to Know
The Defense Logistics Agency (DLA), is cracking down on procurement fraud and contract fraud. It has recently issued multiple referrals for suspension or debarment, and it is targeting not only prime vendors, but...more
In October 2024, the Department of Justice (DOJ) and the Securities and Exchange Commission (SEC) announced settlements with Raytheon Company, a division of multinational defense contractor RTX, over defective pricing and...more
The Justice Department’s global settlement included a significant False Claims Act resolution, resulting in a second deferred prosecution agreement (“DPA”) for a three-year term. A criminal information was filed in the...more
Raytheon’s comprehensive settlement included FCPA violations and failures to make required disclosures to the Defense Department concerning fees and commissions. This portion of the settlement was filed in the Eastern...more
Raytheon Company (Raytheon) — a subsidiary of defense contractor, RTX (formerly known as Raytheon Technologies Corporation) — agreed to pay over $950 million to resolve the Justice Department’s investigations into: (i) a...more
The Department of Defense (DoD) published a Final Rule earlier this month formally implementing the Cybersecurity Maturity Model Certification (CMMC) Program. This Final Rule is the culmination of five years of work to...more
The federal government's recent False Claims Act suit against Georgia Tech highlights the importance of complying with cybersecurity standards when working on federal contracts. This action signifies the U.S. Department of...more
Two years after announcing the second iteration of the U.S. Department of Defense's (DoD) Cybersecurity Maturity Model Certification (CMMC) program, the DoD released its proposed rule that, if adopted, will implement the...more
The Inspector General (IG) for the U.S. Department of Defense (DOD) issued a report critical of recent efforts by contractors to protect Controlled Unclassified Information (CUI). The report, which followed the DOD IG's...more
In some ways, the prospects for a technology company entering the defense business have never looked better. Last year saw record global military spending exceeding $2 trillion for the first time, while the U.S. spent $801...more
The U.S. Department of Defense (DoD) recently released a memorandum signaling its increasing willingness to review contractor compliance with cybersecurity standards in its contracts and take action against noncompliant...more
Key Takeaways: - Heightened Government Attention to Fraud Risk - The U.S. Government Accountability Office (GAO) recently released a report identifying ongoing vulnerabilities to fraud in the defense contracting sphere....more