The LathamTECH Podcast — Turning a London Eye Toward International Tech Growth
The Rise of OTAs in Defense Contracting: Opportunities, Risks, and What Contractors Need to Know
Podcast - Navigating the Updated SF-328 Form
Diversifying Your Contract Pipeline by Maximizing Opportunities through the DOD’s Mentor Protégé Program
Podcast - The "I" in FOCI and AI: Innovation, Intelligence, Influence
Podcast - Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector, Part 2
Episode 345 -- Raytheon Pays $950 Million to Resolve Fraud, FCPA, ITAR and False Claims Act Violations
Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector
Understanding FOCI Mitigation
Cybersecurity Insights: Updates on CMMC Implementation and CUI Identification
Protecting Our Nation’s Data: Cybersecurity Compliance for Government Contractors
Podcast - The State of Contractor Cybersecurity with Katie Arrington
What Do the Newly Released CMMC 2.1 Documents Mean?
Season 2 Episode 5- Defense Trade Down Under
Podcast - Third-Party Assessments and NIST SP 800-171
Third-Party Assessments and NIST SP 800-171
[Podcast] NSA Cybersecurity Services for Defense Contractors
Podcast: A Deep Dive into Consortia with Dan Sennott and Stephanie Halcrow
Federal Contracting Overseas: Insider Tips for Ensuring Compliance with Host Country Laws
Cybersecurity and 889 Compliance in 2021: What Government Contractors Need to Know
PilieroMazza recently highlighted a Department of Defense (DOD) memo requiring DOD Components to adopt the Software Acquisition Pathway (SWP) as the preferred acquisition method for business and weapon system programs. The...more
Federal contractors, including defense contractors, should prepare for the emergence of new requirements in the coming months that are designed to strengthen software supply chain security, impose more stringent cybersecurity...more
The defense technology sector (“defense tech”) has experienced remarkable growth in recent years, with projections indicating continued expansion in the near future. This surge is largely driven by increased global defense...more
On 15 September 2021, Australia, the United Kingdom (UK), and the United States (US) (each a member State) announced AUKUS as a new security partnership that will promote a free and open Indo-Pacific that is secure and...more
The United States Department of Defense’s (DoD) supplement to the Federal Acquisition Regulation (DFARS) requires the DoD to adopt a Modular Open System Approach (MOSA), which is a technical and business strategy for open and...more
The United States Department of Defense (“DoD”) recently published its Defense Industrial Base Cybersecurity Strategy 2024. For context, the DIB is comprised of more than 100,000 domestic and foreign companies or...more
A recent export enforcement case describes a common compliance challenge faced by many U.S. companies. In this case, a California company manufactured electronic test and measurement equipment for both commercial and...more
Late last year in the Holland & Knight blog post, "DOD's New IP Rules May Impact Contractors' Rights in Computer Software and Technical Data," the firm reported on new intellectual property (IP) rules proposed by the U.S....more
The federal government’s recoveries from investigations and cases involving the False Claims Act (FCA) fell in fiscal year (FY) 2020 to US$2.2 billion from US$3.05 billion in FY2019. However, with an influx of approximately...more
In today’s world, companies in various industries are increasingly running into issues that have national security implications. Research universities and other academic institutions can face issues involving national...more
The shift to a remote working environment as a result of the coronavirus (COVID-19) pandemic has drawn attention to data security and business continuity risks. With increased demand for technology services comes increased...more
The anti-corruption and bribery enforcement landscape is constantly evolving. Companies operating in the Aerospace, Defense, and Government Services (ADG) industry sector must therefore vigilantly track developments in this...more
Earlier this month, it was reported that the National Security Agency (NSA) discovered a serious security flaw in Microsoft Windows 10 cryptographic functionality, CVE-2020-0601.That security flaw could render trust...more
Government recoveries under False Claims Act (FCA) enforcement grew slightly in fiscal year (FY) 2019 to just over $3 billion. Companies operating in the Aerospace, Defense, and Government Services (ADG) industry continue...more
• DDTC and BIS have published concurrent NOIs requesting public comments on the controls over the export and reexport of explosives, personal protective equipment, and military and intelligence electronics. (By volume and...more
This is the seventh blog post in a series analyzing the current draft of the 2018 National Defense Authorization Act (NDAA) as agreed to by House and Senate negotiators on November 8, 2017. Stay tuned for more blog posts...more
On 12 July 2017, the German Federal Government significantly reinforced the barriers for the acquisition of German companies by non-EU companies. The new Regulation for the Amendment of the Foreign Trade and Payments...more
You are the chief legal officer of a U.S. company. Your CEO walks into your office and announces that your company is about to conclude its first international sale. In addition, the company has just appointed distributors in...more
On January 7, 2015, the U.S. Department of Defense (“DoD” or “the Department”) released an update for DoD Instruction 5000.02, on the “Operation of the Defense Acquisition Service.” The new Instruction is designed to assist...more
The International Traffic in Arms Regulations, or ITAR, control the export of software classified as a “defense article.” The United States Munitions List [USML] contains items regulated by the ITAR, including a range...more