NIST Digital Identity Guidelines take a giant leap forward
With the first significant update since 2013, NIST 800-63-3 brings a modern and flexible approach to digital identity that serves the mission needs agencies are facing today. Enhance your identity management program for FISMA, RMF and more.
GSA Highly Adaptive Cybersecurity Services (HACS)
GSA Highly Adaptive Cybersecurity Services (HACS) Special Item Numbers (SINs) available on IT Schedule 70, provide federal, state, and local governments rapid access to pre-vetted support services from high quality cybersecurity vendors, including TalaTek. Are you taking advantage?
Are you Properly Managing Federal High Value Assets?
DHS and OMB directives are pushing agencies to improve the security of their High Value Assets (HVAs). Do you have the processes in place to ensure you’re compliant and properly identifying and protecting your HVAs?
NIST’s Guidance on TDEA Block Ciphers
NIST’s November ITL Bulletin covers TDEA Block Ciphers.
Overcoming Container Security Challenges
NIST’s October ITL Bulletin covers container security concerns.
Is Critical Infrastructure the Next Cyber Battleground?
In 2016 DHS investigated 290 incidents threatening critical infrastructure (CI), over half of which employed common attack patterns. As CI industrial control systems (ICS) become increasingly integrated into traditional IT environments, is your organization prepared to face the security challenges?
Winning the Cybersecurity Talent Wars
Shortages in cybersecurity talent continue to deepen. Each year only 60,000 graduates join the computer science and information security workforce, leaving more than 200,000 jobs unfilled each year. How will your company fare in the aggressive hunt for elusive talent?
Managing the Risk of the Internet of Things
The Internet of Things (IoT) is driving the next productivity revolution. IoT devices bring ubiquitous connectivity, as well as security challenges, for organizations. Implementing sound cyber security practices can reduce risks while reaping benefits.
Employee Education Is the Best Cyber Security Investment
Despite growing investment in cyber security technologies, the human factor continues to be a common point of failure across breaches. The proper education program can turn your employees into your greatest line of defense and satisfy risk and compliance requirements.
Corporate Cyber Security Begins at Home
Investing in the latest technologies is surely effective in protecting your organization from cyber threats. However, if you’re not investing in ongoing end user awareness and education, are you leaving your employees unprepared – and your company vulnerable?
If you answer “yes” to any of these questions, you’ll want to contact us.
- Are you concerned about meeting compliance and mitigating security risks with the same budget?
- Do you want to understand where your business is most vulnerable?
- Do you want to know more about using automation to manage compliance and control risk?
- Would you like to have a single team assess your compliance using more than one compliance standard?


