Government Contracts & Investigations

Category: Cyber, Data Security, and Privacy

CMMC Update

By

Last week we reported on developments in the Department of Defense (DoD) efforts to implement enhanced Defense Industrial Base cybersecurity requirements. Following our report, Katie Arrington, DoD Chief Information Security Officer in the Office of the Undersecretary of Defense for Acquisition and Sustainment, confirmed our thoughts that the DoD’s roll out of Cybersecurity Maturity ModelRead More

Topics: Cyber, Data Security, and Privacy

Continuing Developments in Cybersecurity

By

The Government continues to take steps to address its Defense Industrial Base supply chain cybersecurity. Below are some of the emerging developments you should be following in this space: Cybersecurity Maturity Model Certification (CMMC) Previously we reported on the Department of Defense’s (DoD’s) activities to roll out a CMMC program. DoD has now rolled outRead More

Topics: Cyber, Data Security, and Privacy, Supply Chain Risk Management

Stinson Attorneys Presenting on CMMC at NDIA Rocky Mountain Chapter

By

On Tuesday, March 3, 2020, Stinson partners Susan Warshaw Ebner and Eric Whytsell will be presenting on “Cybersecurity Maturity Model Certification (CMMC): Guarding the Keys to the Kingdom” at a National Defense Industrial Association (NDIA) Rocky Mountain Chapter event in Colorado Springs, Colorado. The presentation will highlight the evolution of and latest information about theRead More

Topics: Acquisition Reform and Emerging Issues, Cyber, Data Security, and Privacy

U.S. Government Issues Alert Regarding Critical Windows 10 Update – Are You Entitled To Compensation?

By

Earlier this month, the National Security Agency (NSA) discovered a serious security flaw in Microsoft Windows 10 cryptographic functionality, CVE-2020-0601.That security flaw could render trust certifications used to authenticate sources in communications and files vulnerable to spoofing or attack. As the NSA Cybersecurity Advisory notes, “[e]xploitation of the vulnerability allows attackers to defeat trusted networkRead More

Topics: Claims and Disputes, Contract Administration, Cyber, Data Security, and Privacy