Cybersecurity

Is Critical Infrastructure the Next Cyber Battleground?

Is Critical Infrastructure the Next Cyber Battleground?

In 2016 DHS investigated 290 incidents threatening critical infrastructure (CI), over half of which employed common attack patterns. As CI industrial control systems (ICS) become increasingly integrated into traditional IT environments, is your organization prepared to face the security challenges?

read more
Winning the Cybersecurity Talent Wars

Winning the Cybersecurity Talent Wars

Shortages in cybersecurity talent continue to deepen. Each year only 60,000 graduates join the computer science and information security workforce, leaving more than 200,000 jobs unfilled each year. How will your company fare in the aggressive hunt for elusive talent?

read more
Managing the Risk of the Internet of Things

Managing the Risk of the Internet of Things

The Internet of Things (IoT) is driving the next productivity revolution. IoT devices bring ubiquitous connectivity, as well as security challenges, for organizations. Implementing sound cyber security practices can reduce risks while reaping benefits.

read more
Employee Education Is the Best Cyber Security Investment

Employee Education Is the Best Cyber Security Investment

Despite growing investment in cyber security technologies, the human factor continues to be a common point of failure across breaches. The proper education program can turn your employees into your greatest line of defense and satisfy risk and compliance requirements.

read more
Corporate Cyber Security Begins at Home

Corporate Cyber Security Begins at Home

Investing in the latest technologies is surely effective in protecting your organization from cyber threats. However, if you’re not investing in ongoing end user awareness and education, are you leaving your employees unprepared – and your company vulnerable?

read more
Updating the Keys for DNS Security

Updating the Keys for DNS Security

NIST’s September ITL Bulletin provides an overview of DNSSEC protocol and validation keys, the key change timeline, and what DNS administrators need to know about DNSSEC validation.

read more
Even your Drone Can Be Hacked!

Even your Drone Can Be Hacked!

Did you know that even your drone can be hacked? It’s not just your company website, your personal bank accounts or your home security system that are at risk. Donny Wadyka and Brian Thiellen, from TalaTek, to always provide the most current risk management counsel to their clients, attended the 25th annual DefCon conference in …

read more
Understanding NIST Digital Identity Guidelines

Understanding NIST Digital Identity Guidelines

NIST has released its August ITL Bulletin on digital identity guidelines. It serves as a primer on NIST SP 800-63-3, Digital Identity Guidelines, published June in a four-part suite covering technical protocols for digital authentication of users to federal …

read more