The LathamTECH Podcast — Turning a London Eye Toward International Tech Growth
The Rise of OTAs in Defense Contracting: Opportunities, Risks, and What Contractors Need to Know
Podcast - Navigating the Updated SF-328 Form
Diversifying Your Contract Pipeline by Maximizing Opportunities through the DOD’s Mentor Protégé Program
Podcast - The "I" in FOCI and AI: Innovation, Intelligence, Influence
Podcast - Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector, Part 2
Episode 345 -- Raytheon Pays $950 Million to Resolve Fraud, FCPA, ITAR and False Claims Act Violations
Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector
Understanding FOCI Mitigation
Cybersecurity Insights: Updates on CMMC Implementation and CUI Identification
Protecting Our Nation’s Data: Cybersecurity Compliance for Government Contractors
Podcast - The State of Contractor Cybersecurity with Katie Arrington
What Do the Newly Released CMMC 2.1 Documents Mean?
Season 2 Episode 5- Defense Trade Down Under
Podcast - Third-Party Assessments and NIST SP 800-171
Third-Party Assessments and NIST SP 800-171
[Podcast] NSA Cybersecurity Services for Defense Contractors
Podcast: A Deep Dive into Consortia with Dan Sennott and Stephanie Halcrow
Federal Contracting Overseas: Insider Tips for Ensuring Compliance with Host Country Laws
Cybersecurity and 889 Compliance in 2021: What Government Contractors Need to Know
PilieroMazza recently highlighted a Department of Defense (DOD) memo requiring DOD Components to adopt the Software Acquisition Pathway (SWP) as the preferred acquisition method for business and weapon system programs. The...more
Federal contractors, including defense contractors, should prepare for the emergence of new requirements in the coming months that are designed to strengthen software supply chain security, impose more stringent cybersecurity...more
The United States Department of Defense’s (DoD) supplement to the Federal Acquisition Regulation (DFARS) requires the DoD to adopt a Modular Open System Approach (MOSA), which is a technical and business strategy for open and...more
A recent export enforcement case describes a common compliance challenge faced by many U.S. companies. In this case, a California company manufactured electronic test and measurement equipment for both commercial and...more
Late last year in the Holland & Knight blog post, "DOD's New IP Rules May Impact Contractors' Rights in Computer Software and Technical Data," the firm reported on new intellectual property (IP) rules proposed by the U.S....more
The federal government’s recoveries from investigations and cases involving the False Claims Act (FCA) fell in fiscal year (FY) 2020 to US$2.2 billion from US$3.05 billion in FY2019. However, with an influx of approximately...more
In today’s world, companies in various industries are increasingly running into issues that have national security implications. Research universities and other academic institutions can face issues involving national...more
Earlier this month, it was reported that the National Security Agency (NSA) discovered a serious security flaw in Microsoft Windows 10 cryptographic functionality, CVE-2020-0601.That security flaw could render trust...more
Government recoveries under False Claims Act (FCA) enforcement grew slightly in fiscal year (FY) 2019 to just over $3 billion. Companies operating in the Aerospace, Defense, and Government Services (ADG) industry continue...more
This is the seventh blog post in a series analyzing the current draft of the 2018 National Defense Authorization Act (NDAA) as agreed to by House and Senate negotiators on November 8, 2017. Stay tuned for more blog posts...more
On January 7, 2015, the U.S. Department of Defense (“DoD” or “the Department”) released an update for DoD Instruction 5000.02, on the “Operation of the Defense Acquisition Service.” The new Instruction is designed to assist...more