The LathamTECH Podcast — Turning a London Eye Toward International Tech Growth
The Rise of OTAs in Defense Contracting: Opportunities, Risks, and What Contractors Need to Know
Podcast - Navigating the Updated SF-328 Form
Diversifying Your Contract Pipeline by Maximizing Opportunities through the DOD’s Mentor Protégé Program
Podcast - The "I" in FOCI and AI: Innovation, Intelligence, Influence
Podcast - Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector, Part 2
Episode 345 -- Raytheon Pays $950 Million to Resolve Fraud, FCPA, ITAR and False Claims Act Violations
Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector
Understanding FOCI Mitigation
Cybersecurity Insights: Updates on CMMC Implementation and CUI Identification
Protecting Our Nation’s Data: Cybersecurity Compliance for Government Contractors
Podcast - The State of Contractor Cybersecurity with Katie Arrington
What Do the Newly Released CMMC 2.1 Documents Mean?
Season 2 Episode 5- Defense Trade Down Under
Podcast - Third-Party Assessments and NIST SP 800-171
Third-Party Assessments and NIST SP 800-171
[Podcast] NSA Cybersecurity Services for Defense Contractors
Podcast: A Deep Dive into Consortia with Dan Sennott and Stephanie Halcrow
Federal Contracting Overseas: Insider Tips for Ensuring Compliance with Host Country Laws
Cybersecurity and 889 Compliance in 2021: What Government Contractors Need to Know
The U.S. Department of Defense (DOD) obligates about half a trillion dollars a year to private contractors for everything from high-end weapons and data systems to basic goods and services like fuel, shipping, food, and...more
Last week, President Trump signed over 10 executive orders related to efforts to strengthen America’s defense industry, bolster coal production and electric grid management, and roll back other regulations it views as...more
On October 15, 2024, the Department of Defense (DoD) published the final rule for the Cybersecurity Maturity Model Certification (CMMC) Program that not only finalizes the long-anticipated CMMC Rule but also foreshadows what...more
Merger and acquisition (M&A) activity is often the lifeblood of corporate growth. While whole treatises can be, and have been, written on cybersecurity and legal challenges during M&A activity, the following are a few key...more
As experienced protest counsel, we know (i) that you can pick lint off of any procurement; and (ii) because of that fact, a protester alleging error in the procurement process needs to show that the error was “prejudicial.”...more
While all companies should be concerned with their cybersecurity posture, companies in the aerospace, defense, and government services (ADG) industry are potentially subject to greater risks due to the industry's highly...more