Recent state-sponsored cyberattacks prove that cyber espionage campaigns are targeting the public and private sectors with increasing sophistication and scale. Learn what you can do.
Keeping track of compliance in the AWS Cloud just got easier. It will now be integrated and available with TalaTek’s risk-management platform TiGRIS.
TalaTek shares six reasons for organizations to adopt a governance, risk management and compliance program.
TalaTek client Chris Fillebrown, lead systems engineer for the Human Genome Sequencing Center, Baylor College of Medicine, examines why NIST withdrew NIST Special Publication 800-64r-2 and adopted NIST SP 800-160v1 in its place. looks at the upside of remote work for employees and employers alike.
Coming Soon: Department of Defense Cyber Security Maturity Model Certification Takes Aim at Protecting the Defense Supply Chain
TalaTek examines the new, impending Department of Defense unified certification standard, the Cybersecurity Maturity Model Certification, and what actions vendors should begin to take to prepare.
Learn about the importance of incident response planning and how it allows an organization to establish a series of best practices to stop or minimize an intrusion before it causes damage.
NIST’s October ITL Bulletin covers container security concerns.
February 15, 2015, Oakton, VA – On February 11, 2015, TalaTek, LLC, a woman-owned small business (WOSB), providing specialized managed-services in risk management, security and compliance, became an accredited FedRAMP Third Party Assessment Organization (3PAO).
On October 16th and 17th, 2014 TalaTek attended the 12th annual Qualys Security Conference in Las Vegas, Nevada. The conference connected customers with Qualys engineers and leading industry experts. In addition, Qualys architects unveiled many new groundbreaking technologies which they are building into their Unified Cloud Security and Compliance Platform.
Baan Alsinawi, TalaTek founder and president, featured presenter at ISACA Governance, Risk and Compliance conference.
On October 21, 2014, ISACA held an all-day conference on Governance, Risk and Compliance (GRC) in Arlington, VA. The conference was created to provide CIOs, risk-management groups, system administrators, and security and audit professionals the opportunity to explore and discuss new trends, perspectives, solutions and leading practices.
It’s official: on April 16, 2013, the House of Representatives unanimously approved a bill making the first significant reforms in 11 years to the way the federal government governs information security.
The Federal Information Security Amendments Act of 2013 (H.R. 1163) updates the Federal Information Security Management Act of 2002. The House also overwhelmingly approved the Cyber-security Enhancement Act, created to advance cyber-security research and development, and expand and train a cyber-security workforce.
On December 8, 2011, OMB issued the “Security Authorization of Information Systems in Cloud Computing Environments” policy, defining the Federal Risk and Authorization Management Program (FedRAMP). As the first steps in implementing FedRAMP, GSA published a revised...