The LathamTECH Podcast — Turning a London Eye Toward International Tech Growth
The Rise of OTAs in Defense Contracting: Opportunities, Risks, and What Contractors Need to Know
Podcast - Navigating the Updated SF-328 Form
Diversifying Your Contract Pipeline by Maximizing Opportunities through the DOD’s Mentor Protégé Program
Podcast - The "I" in FOCI and AI: Innovation, Intelligence, Influence
Podcast - Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector, Part 2
Episode 345 -- Raytheon Pays $950 Million to Resolve Fraud, FCPA, ITAR and False Claims Act Violations
Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector
Understanding FOCI Mitigation
Cybersecurity Insights: Updates on CMMC Implementation and CUI Identification
Protecting Our Nation’s Data: Cybersecurity Compliance for Government Contractors
Podcast - The State of Contractor Cybersecurity with Katie Arrington
What Do the Newly Released CMMC 2.1 Documents Mean?
Season 2 Episode 5- Defense Trade Down Under
Podcast - Third-Party Assessments and NIST SP 800-171
Third-Party Assessments and NIST SP 800-171
[Podcast] NSA Cybersecurity Services for Defense Contractors
Podcast: A Deep Dive into Consortia with Dan Sennott and Stephanie Halcrow
Federal Contracting Overseas: Insider Tips for Ensuring Compliance with Host Country Laws
Cybersecurity and 889 Compliance in 2021: What Government Contractors Need to Know
For space, defense, and industrial technology companies, securing government contracts is often a major growth milestone. But without a clear IP strategy, working with agencies like NASA or the Department of Defense (DoD) can...more
On December 23, 2024, President Biden signed into law the National Defense Authorization Act (NDAA) for Fiscal Year (FY) 2025. The annual bill authorizes spending for the Department of Defense (DOD) while setting other...more
The Second Session of the Standing Committee of the 14th National People’s Congress voted and passed on April 26, 2023 the newly revised “Anti-Espionage Law of the People’s Republic of China” (the New Anti-Espionage Law). The...more
I remember an argument between two friends about which of their favorite restaurants was best. The irony being that they both were… depending on your expectations. One was known for a decent meal at a low price. However, the...more
Trade secrets form one of the most valuable assets of technology companies. The protection of trade secrets is widely seen as essential to foster innovation and economic growth. This past year, both the United States (U.S.)...more
Intellectual property (IP) law is undergoing a major transformation just as additive manufacturing? or 3D printing? has begun to revolutionize the manufacturing industry. The interplay between these two forces could end up...more
Although it appears that the U.S. and Iran are moving closer to a deal regarding Iran’s nuclear program, Iran’s allies appear to remain committed to acquiring military-grade technology from U.S. companies by way of engineers...more