Recent Bid Protest Decisions Reshape Strategies for Future Government Contractor Success
5 W’s of Bid Protests: The Who, What, When, Where, and Why
Bidding for Major Contracts? Compliance Requirements You Should Prepare for Now
Federal Small Business Programs—A Primer for Government Contractors
Government Contracting Phase One: Transitioning From Commercial to Government Work
Williams Mullen's COVID-19 Comeback Plan: Selling Products and Services to the Federal Government
[WEBINAR] Developing FEMA Compliant Procurement Procedures
Last month we reported on the Department of Defense’s (DoD’s) issuance of Version 0.6 of its draft Cybersecurity Maturity Model Certification (CMMC) standard. That draft included DoD updates and revisions to CMMC’s domains,...more
In an unusual move, Delta Airlines (Delta) sued one of its vendors last week for the data breach it experienced in 2017. It’s an unusual move for several reasons. First, in our experience when a vendor causes a data breach,...more
Cybersecurity and protection of sensitive data from external and insider threats are critical for federal contractors across all industries and in all market positions. Each significant data breach or cyber incident and...more
Published by Set-Aside Alert: Cybersecurity is an inescapable and growing-facet of life for government contractors. On the most recent anniversary of the 9/11 tragedy, a Homeland Security Dept. official noted that cyber...more
Machiavelli – yes, that Machiavelli – knew a thing or two about working with a powerful government. In his most well-known writings, Machiavelli opined on both the application of power and importance of intellect when...more