CISCO GLOBAL Footer Logo

TalaTek is a wholly owned member of CISO Global

  • Advisory & Risk
    • CMMC
    • NIST SP 800-171
    • Incident Response Services
    • FedRAMP 3PAO
    • FISMA
      • Achieving FISMA and NIST Compliance
      • FISMA & HIPAA Compliance for NIH Grant Holders
    • Governance, Risk & Compliance
      • TiGRIS
        • TiGRIS Fact Sheet
        • TiGRIS Interactive Video
        • TiGRIS Analyst Report
    • NIST Frameworks
      • NIST SP 800-53 – Security & Privacy Controls for Federal Information Systems
      • NIST Cybersecurity Framework
      • Assess Your NIST 800-171 Compliance
      • Implementing the NIST Risk Management Framework
  • Cybersecurity
    • TiGRIS Technology
    • Cyber Threat Hunting Services
    • Data Loss Prevention
    • Incident Response
    • Penetration Testing/Social Engineering
    • Policies & Procedures
    • Risk Management Services
    • Third Party Risk Management
  • Technology
    • TiGRIS
    • AWS
      • Architecting in the Cloud
  • About
    • About TalaTek
    • Contact
    • Resources
      • Videos
  • Insights
    • Press
    • News
    • Blog
      • A Cyberpunk Guide to Privacy
        • Data Rights in the Corporate Dystopia: Why Your Privacy Matters
        • Hacking Your Smart Home: A Netrunner’s Guide to Reclaiming Your Domain
        • Ghost Protocol: Erasing Your Digital Footprint from the Corporate Mainframe
        • Evading the Surveillance Grid: A Street Samurai’s Guide to Urban Anonymity

To Achieve President Obama’s Proposed Cut in Federal IT Spending – While Strengthening InfoSec – the Answer Lies in the Cloud.

by Andrew Lowe | Feb 22, 2012 | Compliance, Cybersecurity, FedRAMP

A recent GovInfoSecurity.com article indicated that President Obama’s election-year budget calls for the strengthening of government cybersecurity while reducing overall information technology spending by more than a half-billion dollars. The administrations’ budget,...

Taking Control of Information Security – A How-To Guide for Law Firms

by Andrew Lowe | Oct 5, 2011 | Compliance

Baan Alsinawi’s “Taking Control of Information Security – A How-To Guide for Law Firms” appears in “Law Practice Today” “Failure to protect client records and data within law practices comes with a hefty price tag. According to a...

FOSE 2011 Report: Continuous Monitoring – More than technical controls.

by Andrew Lowe | Aug 2, 2011 | Compliance, News, Risk Management

By Mollie Jewell, CISSP TalaTek began delivering FISMA continuous monitoring risk management services to its clients in 2008. At that time, this was something very few paid much attention to, and for the most part compliance efforts ended by signing the certification...

The White House wants DHS to play a larger role in cybersecurity.

by Andrew Lowe | Jun 5, 2011 | Compliance, Cybersecurity, News

The administration is serious. In one of the first signs of how seriously the current administration takes cybercrime, on May 12 the White House sent its cybersecurity legislation to Capitol Hill, asking for changes in the law. Specifically, the White House wants the...

It was inevitable: the WikiLeaks fallout has led to a White House-ordered review of classified data security.

by Andrew Lowe | Dec 1, 2010 | Compliance, News, Risk Management

In a Nov 30, 2010 Federal Computer Week story, it was announced that the White House has instructed federal agencies to immediately evaluate their security practices. The objective: to determine if they have adequate restrictions in place on employees’ access to...

A costly, dangerous security breach can come from anywhere – but most often from the inside.

by Andrew Lowe | Nov 9, 2010 | Compliance, News, Risk Management

On November 6, 2010, The NY Times ran an article about a security breach at the General Services Agency (GSA). It was not a small breach. One of the GSA’s employees had sent the names and Social Security numbers of the agency’s entire staff to a private email address....
« Older Entries
Next Entries »

Categories

Recent Articles

  • Jacking Into the Machine: Using AI Without Selling Your Soul January 30, 2026
  • Evading the Surveillance Grid: A Street Samurai’s Guide to Urban Anonymity January 29, 2026
  • Ghost Protocol: Erasing Your Digital Footprint from the Corporate Mainframe January 28, 2026
  • Hacking Your Smart Home: A Netrunner’s Guide to Reclaiming Your Domain January 27, 2026
  • Data Rights in the Corporate Dystopia: Why Your Privacy Matters January 26, 2026

Connect with TalaTek

Site Map | Terms/Privacy

©2006-2026, TalaTek, LLC; All Rights Reserved.
All trademarks are the property of their respective owners.

Website Development:
HQ Secure Global Internet

 

CISCO GLOBAL Footer Logo

NAICS 541511, 541512, 541513, 541519

FedRAMP Third Party Assessment Organization (3PAO)

ISO/IEC 17020:2012 Certified

MAS GSA Schedule GS35F399DA

GSA MAS SINs:
Highly Adaptive Cybersecurity Services (HACS) – 54151HACS
Cloud and Cloud-Related IT Professional Services – 518210C
Information Technology Professional Services – 54151S

Unique Entity ID: WN1UKHV49AC4

A2LA Accredited logo certificate
A2LA Accredited logo certificate
A2LA Accredited logo certificate
Form Submission Status

SUCCESS!

Your message is on its way to us at light speed.

WBENC Certificate