With the first significant update since 2013, NIST 800-63-3 brings a modern and flexible approach to digital identity that serves the mission needs agencies are facing today. Enhance your identity management program for FISMA, RMF and more.read more
GSA Highly Adaptive Cybersecurity Services (HACS) Special Item Numbers (SINs) available on IT Schedule 70, provide federal, state, and local governments rapid access to pre-vetted support services from high quality cybersecurity vendors, including TalaTek. Are you taking advantage?read more
DHS and OMB directives are pushing agencies to improve the security of their High Value Assets (HVAs). Do you have the processes in place to ensure you’re compliant and properly identifying and protecting your HVAs?read more
NIST’s November ITL Bulletin covers TDEA Block Ciphers.read more
NIST’s October ITL Bulletin covers container security concerns.read more
In 2016 DHS investigated 290 incidents threatening critical infrastructure (CI), over half of which employed common attack patterns. As CI industrial control systems (ICS) become increasingly integrated into traditional IT environments, is your organization prepared to face the security challenges?read more
Shortages in cybersecurity talent continue to deepen. Each year only 60,000 graduates join the computer science and information security workforce, leaving more than 200,000 jobs unfilled each year. How will your company fare in the aggressive hunt for elusive talent?read more
The Internet of Things (IoT) is driving the next productivity revolution. IoT devices bring ubiquitous connectivity, as well as security challenges, for organizations. Implementing sound cyber security practices can reduce risks while reaping benefits.read more
Despite growing investment in cyber security technologies, the human factor continues to be a common point of failure across breaches. The proper education program can turn your employees into your greatest line of defense and satisfy risk and compliance requirements.read more
Investing in the latest technologies is surely effective in protecting your organization from cyber threats. However, if you’re not investing in ongoing end user awareness and education, are you leaving your employees unprepared – and your company vulnerable?read more
If you answer “yes” to any of these questions, you’ll want to contact us.
- Are you concerned about meeting compliance and mitigating security risks with the same budget?
- Do you want to understand where your business is most vulnerable?
- Do you want to know more about using automation to manage compliance and control risk?
- Would you like to have a single team assess your compliance using more than one compliance standard?