Cybersecurity
Employee Cyber Threat Training is Critical to a Firm’s Long Term Success
TalaTek delves into the need for cybersecurity training for employees and offers six best practices to keep employees safe online.
Making a Workplace Culture of Security a Priority
TalaTek recommends promoting a workplace culture of security and offers 5 steps for creating this environment.
Attracting Female Talent in Technology
TalaTek examines the gender gap in tech and offers five steps to promote tech to more women to help level the playing field.
Cyber Warfare is On the Rise
Implementing a robust risk management program can help protect organizations from cyber warfare threats.
How Virtual Teams Can Be Successful
Virtual work or remote work offers upside for both employers and employees. Learn more about the benefits of telecommuting in this article.
TalaTek President and Founder Named as one of the Top 100 Women in Cybersecurity
TalaTek President and Founder Baan Alsinawi named to Top 100 Women in Cybersecurity according to Cybersecurity Ventures.
How Small and Medium Businesses Can Leverage Cybersecurity for Client Value: Six Ways to Get Started
Small to medium sized businesses can extract client value from implementing cybersecurity best practices. Ken Russman of TalaTek helps guide SMBs by sharing six ways to get started.
How can federal agencies objectively rate their vendors?
TalaTek explores how federal agencies can best rate their vendors using CPARS by Diane Weeks, Information Assurance Consultant and Project Manager, TalaTek
TalaTek attends Open Source SEC 2019 Conference
TalaTek CTO Joshua Grove recently attended the Open Source Security (OSSEC) conference with security and DevOp professionals from around the globe to discuss best practices and the future of OSSEC.
Understanding The Implications Cyberwarfare Has On Your Cybersecurity Strategy
TalaTek’s Baan Alsinawi shares how the changing U.S. policy toward cyberattacks can have serious implications on your cybersecurity strategy.
Before You Commit to a Vendor, Consider Your Exit Strategy
Learn how to minimize IT vendor lock in when moving to cloud services like AWS, Amazon and others.
Key Takeaways from the NotPetya Malware Infection
When we talk about risk management, we are often fixated on protecting data confidentiality and mitigating related risks, but there are other equally compelling concerns, such as …














