TalaTek’s Baan Alsinawi shares how the changing U.S. policy toward cyberattacks can have serious implications on your cybersecurity strategy.
Learn how to minimize IT vendor lock in when moving to cloud services like AWS, Amazon and others.
When we talk about risk management, we are often fixated on protecting data confidentiality and mitigating related risks, but there are other equally compelling concerns, such as …
Third-party risk management can be seen as the Russian nesting doll of challenges when it comes to information security, compliance, and certainly ….
TalaTek Information Assurance Consultant Kilani Paulik shares her perspective as a first-time attendee at RSA Conference 2018.
DHS and OMB directives are pushing agencies to improve the security of their High Value Assets (HVAs). Do you have the processes in place to ensure you’re compliant and properly identifying and protecting your HVAs?
NIST’s November ITL Bulletin covers TDEA Block Ciphers.
In 2016 DHS investigated 290 incidents threatening critical infrastructure (CI), over half of which employed common attack patterns. As CI industrial control systems (ICS) become increasingly integrated into traditional IT environments, is your organization prepared to face the security challenges?
Shortages in cybersecurity talent continue to deepen. Each year only 60,000 graduates join the computer science and information security workforce, leaving more than 200,000 jobs unfilled each year. How will your company fare in the aggressive hunt for elusive talent?
The Internet of Things (IoT) is driving the next productivity revolution. IoT devices bring ubiquitous connectivity, as well as security challenges, for organizations. Implementing sound cyber security practices can reduce risks while reaping benefits.
Despite growing investment in cyber security technologies, the human factor continues to be a common point of failure across breaches. The proper education program can turn your employees into your greatest line of defense and satisfy risk and compliance requirements.
Investing in the latest technologies is surely effective in protecting your organization from cyber threats. However, if you’re not investing in ongoing end user awareness and education, are you leaving your employees unprepared – and your company vulnerable?