TalaTek attends “P0WNAG3” Cyber Security Summit: “Threat Intelligence Analysis Techniques and Capabilities.”
On November 6, 2013, TalaTek attended the all-day “P0WNAG3”Cyber Security Summit in Greenbelt, MD, presented by TrainAce. The summit title was “Threat Intelligence Analysis Techniques and Capabilities” and its focus was threat intelligence and mobile application hacking.
MACHA Training – Mitigating Risks at Financial Institutions
On April 4, 2013, TalaTek attended the MACHA (Mid-Atlantic Clearing House Association) training on Account Takeover and Cyber Crime.
The full-day program was designed to assist financial institutions in mitigating their risks from account takeovers.
FISMA Reform Unanimously Passes House
It’s official: on April 16, 2013, the House of Representatives unanimously approved a bill making the first significant reforms in 11 years to the way the federal government governs information security.
The Federal Information Security Amendments Act of 2013 (H.R. 1163) updates the Federal Information Security Management Act of 2002. The House also overwhelmingly approved the Cyber-security Enhancement Act, created to advance cyber-security research and development, and expand and train a cyber-security workforce.
SBA Raises Limits on Federal Contracts for Women-Owned Businesses.
With the new National Defense Authorization Act of 2013, the SBA has made changes to its Women Owned Small Business Federal Contract Program to help women-owned small businesses get more federal contracts so that the federal government can meet and exceed its statutory five percent women’s contracting goal.
TalaTek’s Continuing Education Program: Penetration Testing
Joshua Grove, Senior Information Assurance Consultant and Project Manager, earned EC Council Certified Security Analyst (ECSA) certification while attending an ECSA boot camp at the Academy of Computer Education (ACE) in Greenbelt, Maryland.
FedRAMP Defined.
On December 8, 2011, OMB issued the “Security Authorization of Information Systems in Cloud Computing Environments” policy, defining the Federal Risk and Authorization Management Program (FedRAMP). As the first steps in implementing FedRAMP, GSA published a revised...
To Achieve President Obama’s Proposed Cut in Federal IT Spending – While Strengthening InfoSec – the Answer Lies in the Cloud.
A recent GovInfoSecurity.com article indicated that President Obama’s election-year budget calls for the strengthening of government cybersecurity while reducing overall information technology spending by more than a half-billion dollars. The administrations’ budget,...
TalaTek is now an SBA-Certified (W8) Women-Owned Small Business
We are now one of the U.S. Small Business Administration’s certified women-owned small business contractors.
Taking Control of Information Security – A How-To Guide for Law Firms
Baan Alsinawi's "Taking Control of Information Security – A How-To Guide for Law Firms" appears in "Law Practice Today" "Failure to protect client records and data within law practices comes with a hefty price tag. According to a 2007 ABA report, it can cost a law...
FOSE 2011 Report: Continuous Monitoring – More than technical controls.
By Mollie Jewell, CISSP TalaTek began delivering FISMA continuous monitoring risk management services to its clients in 2008. At that time, this was something very few paid much attention to, and for the most part compliance efforts ended by signing the certification...
If you answer “yes” to any of these questions, you’ll want to contact us.
- Are you concerned about meeting compliance and mitigating security risks with the same budget?
- Do you want to understand where your business is most vulnerable?
- Do you want to know more about using automation to manage compliance and control risk?
- Would you like to have a single team assess your compliance using more than one compliance standard?


