CISCO GLOBAL Footer Logo

TalaTek is a wholly owned member of CISO Global

  • Advisory & Risk
    • CMMC
    • NIST SP 800-171
    • Incident Response Services
    • FedRAMP 3PAO
    • FISMA
      • Achieving FISMA and NIST Compliance
      • FISMA & HIPAA Compliance for NIH Grant Holders
    • Governance, Risk & Compliance
      • TiGRIS
        • TiGRIS Fact Sheet
        • TiGRIS Interactive Video
        • TiGRIS Analyst Report
    • NIST Frameworks
      • NIST SP 800-53 – Security & Privacy Controls for Federal Information Systems
      • NIST Cybersecurity Framework
      • Assess Your NIST 800-171 Compliance
      • Implementing the NIST Risk Management Framework
  • Cybersecurity
    • TiGRIS Technology
    • Cyber Threat Hunting Services
    • Data Loss Prevention
    • Incident Response
    • Penetration Testing/Social Engineering
    • Policies & Procedures
    • Risk Management Services
    • Third Party Risk Management
  • Technology
    • TiGRIS
    • AWS
      • Architecting in the Cloud
  • About
    • About TalaTek
    • Contact
    • Resources
      • Videos
  • Insights
    • Press
    • News
    • Blog
      • A Cyberpunk Guide to Privacy
        • Data Rights in the Corporate Dystopia: Why Your Privacy Matters
        • Hacking Your Smart Home: A Netrunner’s Guide to Reclaiming Your Domain
        • Ghost Protocol: Erasing Your Digital Footprint from the Corporate Mainframe
        • Evading the Surveillance Grid: A Street Samurai’s Guide to Urban Anonymity

Understanding The Implications Cyberwarfare Has On Your Cybersecurity Strategy

by Baan Alsinawi | Jan 30, 2019 | In the News

Here’s what businesses must do to stay ahead of threats, which can often be avoided with appropriate assessment, controls and monitoring

Are You Using These Best Practices to Build a Vendor Risk Management Program?

by Andrew Lowe | Jan 8, 2019 | In the News

Vendor management is critical to the security of today’s networks. Learn more about best practices to build a vendor risk management program.

Are You Using These Best Practices to Build a Vendor Risk Management Program?

by Andrew Lowe | Dec 18, 2018 | In the News

Today’s IT playing field implores a higher state of alertness, not only within your enterprise but also outside of it. However, when it comes security, not all vendors are created equal. Some very likely have inferior security hygiene and practices that can affect you big time

Are You Using These Best Practices to Build a Vendor Risk Management Program?

by Andrew Lowe | Dec 18, 2018 | In the News

Today’s IT playing field implores a higher state of alertness, not only within your enterprise but also outside of it. However, when it comes security, not all vendors are created equal. Some very likely have inferior security hygiene and practices that can affect you big time

Disk-Wiping ‘Shamoon’ Malware Resurfaces With File-Erasing Malware in Tow

by Andrew Lowe | Dec 17, 2018 | In the News

As with previous attacks, organizations in the Middle East appear to be main targets, Symantec says. Organizations in the United Arab Emirates and Saudi Arabia are once again being targeted in a new wave of attacks involving Shamoon, a malware strain that was used to destroy more than 30,000 PCs at oil giant Saudi Aramco in 2012.

Considerations for Cloud Service Providers on the Path to FedRAMP Accreditation

by Andrew Lowe | Dec 10, 2018 | FedRAMP, News

TalaTek’s Baan Alsinawi offers six considerations for cloud service providers on the path to FedRAMP accreditation.

Avoid Coal in Your Digital Stocking — Here’s How to Improve Your Security Posture in 2019

by HQSecure | Dec 10, 2018 | In the News

Find the latest security analysis and insight from top IT security experts and leaders, made exclusively for security professionals and CISOs

Is the NIST Cybersecurity Framework Enough to Protect Your Organization?

by Andrew Lowe | Dec 10, 2018 | In the News

The National Institute of Standards and Technology (NIST) Cybersecurity Framework, also known as the Framework for Improving Critical Infrastructure Cybersecurity and commonly referred to as CSF, is top of mind for many organizations.

University Corporation for Atmospheric Research Awards Risk Management Services Contract to TalaTek

by Andrew Lowe | Nov 28, 2018 | News

The University Corporation for Atmospheric Research (UCAR) awards TalaTek a contract to support annual risk assessments in accordance with NIST and FISMA requirements.

Before You Commit to a Vendor, Consider Your Exit Strategy

by Baan Alsinawi | Nov 15, 2018 | Cybersecurity, Risk Management

Learn how to minimize IT vendor lock in when moving to cloud services like AWS, Amazon and others.

« Older Entries
Next Entries »

Categories

Recent Articles

  • Jacking Into the Machine: Using AI Without Selling Your Soul January 30, 2026
  • Evading the Surveillance Grid: A Street Samurai’s Guide to Urban Anonymity January 29, 2026
  • Ghost Protocol: Erasing Your Digital Footprint from the Corporate Mainframe January 28, 2026
  • Hacking Your Smart Home: A Netrunner’s Guide to Reclaiming Your Domain January 27, 2026
  • Data Rights in the Corporate Dystopia: Why Your Privacy Matters January 26, 2026

Connect with TalaTek

Site Map | Terms/Privacy

©2006-2026, TalaTek, LLC; All Rights Reserved.
All trademarks are the property of their respective owners.

Website Development:
HQ Secure Global Internet

 

CISCO GLOBAL Footer Logo

NAICS 541511, 541512, 541513, 541519

FedRAMP Third Party Assessment Organization (3PAO)

ISO/IEC 17020:2012 Certified

MAS GSA Schedule GS35F399DA

GSA MAS SINs:
Highly Adaptive Cybersecurity Services (HACS) – 54151HACS
Cloud and Cloud-Related IT Professional Services – 518210C
Information Technology Professional Services – 54151S

Unique Entity ID: WN1UKHV49AC4

A2LA Accredited logo certificate
A2LA Accredited logo certificate
Form Submission Status

SUCCESS!

Your message is on its way to us at light speed.

WBENC Certificate