Compliance
To Achieve President Obama’s Proposed Cut in Federal IT Spending – While Strengthening InfoSec – the Answer Lies in the Cloud.
A recent GovInfoSecurity.com article indicated that President Obama’s election-year budget calls for the strengthening of government cybersecurity while reducing overall information technology spending by more than a half-billion dollars. The administrations’ budget,...
Taking Control of Information Security – A How-To Guide for Law Firms
Baan Alsinawi's "Taking Control of Information Security – A How-To Guide for Law Firms" appears in "Law Practice Today" "Failure to protect client records and data within law practices comes with a hefty price tag. According to a 2007 ABA report, it can cost a law...
FOSE 2011 Report: Continuous Monitoring – More than technical controls.
By Mollie Jewell, CISSP TalaTek began delivering FISMA continuous monitoring risk management services to its clients in 2008. At that time, this was something very few paid much attention to, and for the most part compliance efforts ended by signing the certification...
The White House wants DHS to play a larger role in cybersecurity.
The administration is serious. In one of the first signs of how seriously the current administration takes cybercrime, on May 12 the White House sent its cybersecurity legislation to Capitol Hill, asking for changes in the law. Specifically, the White House wants the...
It was inevitable: the WikiLeaks fallout has led to a White House-ordered review of classified data security.
In a Nov 30, 2010 Federal Computer Week story, it was announced that the White House has instructed federal agencies to immediately evaluate their security practices. The objective: to determine if they have adequate restrictions in place on employees’ access to...
A costly, dangerous security breach can come from anywhere – but most often from the inside.
On November 6, 2010, The NY Times ran an article about a security breach at the General Services Agency (GSA). It was not a small breach. One of the GSA’s employees had sent the names and Social Security numbers of the agency’s entire staff to a private email address....
TalaTek’s approach is validated at CyberSecurity Seminar.
We couldn’t agree more. Last month, TalaTek team members attended a conference offered by CyberSecurity Seminars in partnership with Crowell & Moring LLP. It had the intriguing title “FISMA – A New Path Forward.” What we heard was that others were beginning to use...
We’ve come a long way since 2006.
In 2006, we recognized the need for an entirely new approach to risk management, security and compliance in federal IT implementations. That's how TalaTek was born. On the second of September, 2010, we learned that the Government Information Security Leadership...
Defense in Depth: The Way to Stronger Security.
Layered protection through security design, policies and processes As regulatory compliance and audits increase in frequency and complexity, organizations are motivated to address security now rather than later. Many an IT professional has begun to fret about the...