The Rise of OTAs in Defense Contracting: Opportunities, Risks, and What Contractors Need to Know
Podcast - Navigating the Updated SF-328 Form
Podcast - A Comparative Guide to Obtaining an FCL: DCSA vs. the Intelligence Community
Diversifying Your Contract Pipeline by Maximizing Opportunities through the DOD’s Mentor Protégé Program
A Comprehensive Overview of FOCI Mitigation
Podcast - Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector, Part 2
Mitigating FOCI Under Section 847
Episode 345 -- Raytheon Pays $950 Million to Resolve Fraud, FCPA, ITAR and False Claims Act Violations
Everyone Come to Play: Exploring FOCI Mitigation Instruments
Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector
Podcast - Navigating M&A Due Diligence: Safeguarding Security Clearances
Podcast - Change Condition Packages: Tips for Cleared Contractors
Podcast - Corporate Documents in the Context of Clearances
Navigating Personnel Security Clearances (PCLs)
Cybersecurity Insights: Updates on CMMC Implementation and CUI Identification
What Is an FCL and How Do I Obtain One?
Protecting Our Nation’s Data: Cybersecurity Compliance for Government Contractors
Intellectual Property In Department of Defense Contracting
The When, Where, Why and How of CMMC with Fernando Machado
The U.S. Department of Defense (DOD) has published a July 2025 report entitled Update on Critical Per- and Polyfluoroalkyl Substance Uses. House Report 118-121, which accompanied the 2024 DOD appropriations bill (H.R. 4365),...more
The Defense Production Act of 1950 (“DPA”) remains one of the most powerful yet underutilized tools in the federal government’s arsenal for mobilizing private industry during national emergencies. For in-house counsel,...more
On June 5, 2025, the Joint Economic Committee (JEC) of the U.S. Congress convened a hearing titled “Barriers to Supply Chain Modernization and Factor Productivity Enhancements.” Throughout the hearing, members and witnesses...more
This week, I discuss with Patricia Underwood, Ph.D., DABT, MBA, Chief Toxicologist, Principal Director – Chemical and Material Risk Management, Office of the Assistant Secretary of Defense, Department of Defense, and my...more
The Department of Defense (DoD) is revving its engines again—this time to rocket past its own software acquisition drag. Launched via an April 24 memo from Acting DoD CIO Katie Arrington, the DoD’s Software Fast Track (SWFT)...more
Continuing its efforts under Chairman Brendan Carr’s leadership to safeguard United States communications infrastructure from foreign threats, the Federal Communications Commission (FCC or Commission) adopted an Order and...more
On May 27, 2025, the U.S. Department of Defense (DOD) issued a request for information (RFI) to gather information to identify and assess critical applications for DOD and the defense industrial base (DIB) that necessitate...more
In a decisive move to stay ahead in an era of rapidly evolving digital threats, the Department of Defense (DOD) is accelerating its push for software modernization. The upcoming launch of the Software Fast Track (SWIFT)...more
What does DMSMS mean? DMSMS stands for Diminishing Manufacturing Sources and Material Shortages. It is the loss or impending loss of manufacturers or suppliers of items, raw materials, or software. In other words, DMSMS...more
As St. Patrick’s Day approaches, many of us are on the lookout for four-leaf clovers, a pot of gold, or perhaps even a mischievous leprechaun guarding his treasure. But in the world of government contracting, the real...more
In this episode of Wiley’s Government Contracts podcast, partners Tracye Howard and Sara Baxenberg discuss the evolving national security concerns surrounding Internet of Things (IoT) modules produced by Chinese companies...more
On January 2, 2025, the US Department of Defense added a number of entities to its list of “Chinese military companies" (CMC List). While being named to this list, by itself, does not prohibit US businesses from continuing to...more
Citing the threats posed by foreign adversaries and criminal organizations, and seeking enhanced accountability for companies that provide software and cloud services to the federal government, the Biden administration has...more
After years of anticipation, the Federal Acquisition Regulation (FAR) Council has announced the arrival of its proposed rule to enhance the safeguarding of Controlled Unclassified Information (CUI) in federal contracts (the...more
The Department of Commerce (Commerce) Office of Information and Communications Technology and Services (OICTS) has broad authority—born out of executive action during the first Trump administration—to identify and mitigate...more
Part of the Biden Administration’s push to enhance U.S. cybersecurity capabilities has focused on imposing new requirements on government contractors. The 2023 National Cybersecurity Strategy suggested, for example, that...more
On August 15, 2024, the Department of Defense (DOD) announced the much-anticipated Proposed Rule that would amend the Defense Federal Acquisition Regulation Supplement (DFARS) to include Cybersecurity Maturity Model...more
In May, the National Institute of Standards and Technology (NIST) issued updated recommendations for security controls for controlled unclassified information (CUI) that is processed, stored or transmitted by nonfederal...more
Ongoing geopolitical developments such as Russia’s war in Ukraine and tensions between China and Taiwan have continued to fuel higher US military spending. The demand for military weapons is the strongest it has been in...more
Welcome to a blog post series on Exiger’s fight to secure supply chains, sponsored by Exiger LLC. In this series, we explore the ongoing efforts of Exiger to lead the discussion and enhancement of Supply Chain Risk...more
On December 15, 2021, Congress passed the National Defense Authorization Act (NDAA or Act) for Fiscal Year (FY) 2022, which President Biden is expected to sign into law soon. As usual, the NDAA contains numerous provisions...more
2020 saw the implementation of several game-changing regulations for government contractors. None the least of these were related to DOD’s Cybersecurity Maturity Model Certification (CMMC) and Section 889 of the National...more
People like to say that cybersecurity threats are constantly evolving. So perhaps it’s fitting that cybersecurity compliance is undergoing a significant evolution of its own this year, too. That evolution is the arrival of...more
Recent weeks have brought news on multiple fronts regarding supply chain risks and actions in response thereto: Commerce ICTS Regulations to Go Into Effect; Chinese ICTS Companies, Products and Services in the...more
The cyber insurance market size is currently valued in the billions, and this does not include insurance policies that do not explicitly mention cyber incidents but may nevertheless cover them. With this in mind,...more