What Are the Cyber Requirements in OTAs and How Do You Meet Them?
For defense innovators, Other Transaction Authorities (OTAs) have become the fastest way to collaborate with the Department of Defense. They let technology companies, research teams, and nontraditional contractors move ideas from prototype to production more rapidly than traditional contracting ever could. But faster does not mean easier. While OTAs offer flexibility in acquisition, they do […]
How Should CISOs Secure OTA Prototypes Without Slowing Delivery?
When speed and innovation drive the mission, security can feel like the one factor holding everything back. For defense programs operating under an Other Transaction Authority (OTA), the challenge is clear: move fast enough to deliver results while remaining secure enough to meet the Department of Defense’s expectations. For Chief Information Security Officers (CISOs) and […]
How OTAs Work for Defense Prototyping and Production
In defense modernization, bridging the gap between breakthrough ideas and deployable systems is risky under rigid procurement. Other Transaction Authorities (OTAs) provide a gateway, allowing the Department of Defense to sidestep certain traditional acquisition constraints, especially during prototyping and scaling to production. When used correctly, OTAs can compress timelines, reduce administrative burden, and attract nontraditional […]
What Is an OTA and When Should You Use One?
In federal contracting, few tools offer as much flexibility or speed as an OTA, short for Other Transaction Authority. It has become a go-to mechanism for agencies and contractors that need to move innovation into the field faster without getting stuck in long acquisition cycles. At Black Rock Engineering & Technology, we work with organizations […]
How to Build Leadership Buy-In for Modernization Projects
Even when the need for modernization is obvious to IT, securing leadership approval can be challenging. Budgets are tight, competing priorities abound, and executives demand proof of ROI before committing to significant investments. The good news is that, with the right approach, you can transform modernization from a “nice-to-have” into a business-critical initiative that leadership […]
How to Get Leadership Buy-In for Your Modernization Project
Even the most well-planned tech modernization initiative can stall if leadership isn’t entirely behind it. Budget approvals, resource allocation, and organizational momentum all depend on executive buy-in, and earning that buy-in takes more than a slide deck of technical details. Step 1: Speak in Business Outcomes, Not Technical Specs Executives don’t sign off on modernization […]
How to Decide Which Legacy Systems to Modernize First
Modernizing your tech stack isn’t about replacing everything at once. If you try, you’ll run into budget overruns, staff burnout, and operational downtime. The real challenge is knowing which systems to tackle first to get the most significant impact on your investment. At Black Rock, we’ve helped defense contractors, tech firms, and government suppliers modernize […]
Don’t Wait for the Audit: Fix Cybersecurity Gaps Before They Cost You
You’re alone if you’ve ever scrambled to prepare for a cybersecurity audit or a review. Many organizations wait until they’re under the gun before trying to close gaps, finalize documentation, or respond to compliance requirements. And in most cases, it does not end well. Whether you’re working toward CMMC, NIST 800-171, ISO 27001, or a […]
Do We Need a Third-Party Cybersecurity Partner?
If you’re like most growing companies, especially in the defense or tech sectors, you’ve probably asked this question at some point: “Do we need to bring in a third-party cybersecurity partner? Or can we handle this ourselves?” It’s a fair question. After all, cybersecurity isn’t new. You likely already have IT support, some security tools, […]
What Is Cyber On-Demand, and How Can It Save You Time and Budget?
Most businesses today understand they need cybersecurity. But many don’t realize how you structure your cybersecurity support, which can be as important as the tools or frameworks you follow. That’s where Cyber On-Demand comes in. Whether you’re a government contractor, a mid-sized tech firm, or a growing business with compliance requirements, Cyber On-Demand offers a […]