What Are the Cyber Requirements in OTAs and How Do You Meet Them?
For defense innovators, Other Transaction Authorities (OTAs) have become the fastest way to collaborate with the Department of Defense. They let technology companies, research teams, and nontraditional contractors move ideas from prototype to production more rapidly than traditional contracting ever could. But faster does not mean easier. While OTAs offer flexibility in acquisition, they do […]
How Should CISOs Secure OTA Prototypes Without Slowing Delivery?
When speed and innovation drive the mission, security can feel like the one factor holding everything back. For defense programs operating under an Other Transaction Authority (OTA), the challenge is clear: move fast enough to deliver results while remaining secure enough to meet the Department of Defense’s expectations. For Chief Information Security Officers (CISOs) and […]
How OTAs Work for Defense Prototyping and Production
In defense modernization, bridging the gap between breakthrough ideas and deployable systems is risky under rigid procurement. Other Transaction Authorities (OTAs) provide a gateway, allowing the Department of Defense to sidestep certain traditional acquisition constraints, especially during prototyping and scaling to production. When used correctly, OTAs can compress timelines, reduce administrative burden, and attract nontraditional […]
What Is an OTA and When Should You Use One?
In federal contracting, few tools offer as much flexibility or speed as an OTA, short for Other Transaction Authority. It has become a go-to mechanism for agencies and contractors that need to move innovation into the field faster without getting stuck in long acquisition cycles. At Black Rock Engineering & Technology, we work with organizations […]
How to Get Leadership Buy-In for Your Modernization Project
Even the most well-planned tech modernization initiative can stall if leadership isn’t entirely behind it. Budget approvals, resource allocation, and organizational momentum all depend on executive buy-in, and earning that buy-in takes more than a slide deck of technical details. Step 1: Speak in Business Outcomes, Not Technical Specs Executives don’t sign off on modernization […]
How Long Does a Full Tech Modernization Usually Take?
When leaders consider modernizing their systems, one of the first questions they ask is, “How long will this take?” The answer isn’t the same for everyone. But there are predictable factors that determine the timeline. Understanding these variables can help you set realistic expectations, manage budgets, and avoid project fatigue. Step 1: Define the Scope […]
In-House vs. Outsourced Cybersecurity: Which Is Right for You?
As cyber threats evolve and compliance requirements tighten, businesses are being forced to ask a tricky question: Should we build an in-house cybersecurity team or bring in outside experts? There’s no one-size-fits-all answer. The right choice depends on your budget, risk profile, internal capacity, and long-term goals. In this article, we’ll compare in-house and outsourced […]
Why Most ATO Efforts Fail and How to Avoid the Pitfalls
Securing an Authority to Operate (ATO) is a critical milestone for any contractor working with federal systems. But here’s the uncomfortable truth: most ATO efforts don’t go smoothly. And many never reach full authorization at all. If you’ve tried to navigate the ATO process, you already know it can feel overwhelming, unclear, and frustrating. In […]
Is Cybersecurity Consulting Worth the Investment for Mid-Sized Tech Firms?
If you’re running a growing tech firm, you’ve likely heard the pitch: hire a cybersecurity consultant to protect your systems, ensure compliance, and reduce risk. However, for mid-sized companies, where every dollar is measured, the real question isn’t whether cybersecurity is essential. Bringing in outside expertise is worth the cost. Let’s walk through the decision […]