As we celebrate Procurement Month this March, it is the perfect opportunity to look ahead and explore the future of eProcurement. In 2025, the landscape will be marked by solutions that are efficient yet resilient, simple, and adaptable. Leading providers are already at the forefront with eProcurement software designed to meet these shifting demands.
Procurement Month: The State of eProcurement in 2025
By Sean Heck on 02/27/25
Navigating DEI in Contracts: How Technology Can Help
By Sean Heck on 02/26/25
The recent Executive Order to end some Diversity, Equity, and Inclusion (DEI) programs across the federal government has many discussing the future of DEI programs through the lens of contract management. While the ultimate long-term impact of the order remains to be seen, it serves as an essential reminder: organizations need sound contract tools to manage DEI-related clauses in contracts regardless of shifting regulatory landscapes. This is where tools like CobbleStone Contract Insight® and its VISDOM® AI can become critical. Read on to learn more!
Goods and Services in Contract Management: A Crucial Distinction
By Sean Heck on 02/20/25
In contract management, the seemingly straightforward distinction between "goods" and "services" serves a surprisingly essential purpose. Although the phrase "goods and services" is typically used as a catch-all term, understanding the specific nature of what you're contracting for is imperative to enforce clarity, mitigate risk, and facilitate successful contract execution. Let's dive into why.
CobbleStone® Takes CISA's Secure by Design Pledge for as Security Attestation
By Sean Heck on 02/19/25
Security is of the utmost importance in the modern digital age, and we take it very seriously at CobbleStone. In addition to taking CISA's (Cybersecurity and Infrastructure Security Agency) Secure by Design Pledge, we utilize a robust, multi-layered defense to safeguard our clients' data and systems. This blog entry describes some of the most important security measures we have in place, with a focus on our proactive strategy for threat mitigation and data protection.