Under the Radar: DOJ's Data Security Rules and Their Impact on Payments Companies — Payments Pros – The Payments Law Podcast
Daily Compliance News: August 1, 2025, The All AI Edition
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
LathamTECH in Focus: Tech Deals: The Emerging Focus of FDI Regulators?
LathamTECH in Focus: Navigating National Security: The Impact of FDI Reviews on Tech M&A
Podcast - Navigating the Updated SF-328 Form
Compliance into the Weeds: Changes in FCPA Enforcement
Episode 372 -- DOJ Applies False Claims Act to Tariff and Trade Violations
Foreign Correspondent Podcast | The America First Investment Policy and What it Means for Investors
Podcast - A Comparative Guide to Obtaining an FCL: DCSA vs. the Intelligence Community
CHPS Podcast Episode 4: Tariffs and Trade Impact
Regulatory Ramblings: Episode 70 – Lessons for Compliance from a Law Enforcement Career + Regional Geopolitical Risks in 2025 with Mark Nuttall and Steve Vickers
SBR-Author’s Podcast: The Unseen Life of an Undercover Agent: A Conversation with Charlie Spillers
Daily Compliance News: May 21, 2025, The I Want You Back Edition
All Things Investigations: Task Force Strategies - Addressing New Government Priorities
Wiley's 2025 Key Trade Developments Series: CFIUS Review and Outbound Investments
Because that's what heroes Do: Deep Space 9 – Episode 31: Extreme Measures – Great Sci Fi and Moral Dilemmas
Compliance Tip of the Day: Standing at the Turning Point
Regulatory Ramblings: Episode 68 - Why Geopolitical Risk Matters to Compliance and Legal Staff with Mark Nuttal and Chad Olsen
For contractors within the Defense Industrial Base (DIB), the time to ensure compliance with the Department of Defense’s (DOD) Cybersecurity Maturity Model Certification program (CMMC) 2.0 is now. DOD formally sent the final...more
On July 9, the Senate Armed Services Committee (SASC) voted 26-1 to advance the National Defense Authorization Act (NDAA) for Fiscal Year (FY) 2026 to the Senate floor. The Senate version of the NDAA includes a comprehensive...more
The Defense Production Act of 1950 (“DPA”) remains one of the most powerful yet underutilized tools in the federal government’s arsenal for mobilizing private industry during national emergencies. For in-house counsel,...more
On June 6, 2025, the Trump Administration issued a new Executive Order, Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144 (the EO) that contains...more
Section 847, which will expand foreign ownership, control or influence requirements to non-classified contracts, is on track for implementation in 2026. Section 847 of the National Defense Authorization Act for FY 2020...more
The Defense Counterintelligence and Security Agency (DCSA) announced the approval of updates made to the Certificate Pertaining to Foreign Interests, or Standard Form (SF) 328, on May 7, 2025. This revised form requires more...more
The Department of Defense (the “DoD”) recently released a new comprehensive guidebook to help navigate intellectual property laws and regulations. The guidebook states: In today’s global military competition, DoD needs to...more
The Office of Management and Budget releases highly anticipated guidance to federal agencies on the use and deployment of artificial intelligence and how to manage its risks....more
As the Department of Defense (DoD) scales artificial intelligence across its operations, government contractors must ensure their AI solutions align with federal mandates and ethical standards. This guide provides links to...more
The reforms called for could have a significant impact on how federal contractors and their subcontractors conduct business with the federal government....more
The US administration on April 15, 2025 issued an executive order that directs prompt and substantial reforms to the Federal Acquisition Regulation (FAR). The order, titled Restoring Common Sense to Federal Procurement,...more
In this episode of "Are We All Clear? Facilitating Security Clearances," host Molly O'Casey speaks with Washington, D.C., International Trade attorney Andrew McAllister about joint ventures and how they interact with facility...more
The administration also turned its focus to copper imports, bird flu, and a proposed new path to American citizenship....more
In this episode of Wiley’s Government Contracts podcast, partners Tracye Howard and Sara Baxenberg discuss the evolving national security concerns surrounding Internet of Things (IoT) modules produced by Chinese companies...more
On December 23, 2024, former President Joe Biden signed into law the National Defense Authorization Act for Fiscal Year 2025, which includes a provision prohibiting the Department of Defense (DOD) from contracting with...more
The Department of Justice (“DOJ”) published its final regulations on “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countries of Concern or Covered Persons” (the “Final Rule”). The Final...more
WHAT: The FAR Council published a proposed rule to incorporate the Controlled Unclassified Information (CUI) Program into the acquisition process and, in doing so, seeks to more clearly define government and contractor roles...more
In one of his last major acts in office, former President Biden signed into law a massive defense spending bill that could have significant implications both for companies that contract with the Department of Defense (DoD)...more
Space has become central to protecting U.S. national security interests as Americans increasingly rely on space-based services to support everyday life. As a result, the U.S. government has bolstered investment in the space...more
Change Healthcare Inc. has amended its initial breach report to the HHS Office for Civil Rights (OCR) to state that 100 million individuals were impacted by its mammoth ransomware attack and breach. However, as of Oct. 24,...more
The Department of Defense (DoD) is currently reviewing and adjudicating the public comments received in response to its proposed regulations implementing its Cybersecurity Maturity Model Certification 2.0 program (CMMC)....more