TalaTek News + Notes
Welcome to TalaTek News + Notes. Here you’ll find industry news and trends related to integrated risk management, cybersecurity and compliance. We’ll also share news and announcements about TalaTek, our clients and our staff. To keep up with the latest from TalaTek, follow us on Twitter or LinkedIn.
The administration is serious. In one of the first signs of how seriously the current administration takes cybercrime, on May 12 the White House sent its cybersecurity legislation to Capitol Hill, asking for changes in the law. Specifically, the White House wants...Read More
The Emerging IT Conference, presented by the National Capital Area Chapter of ISACA on March 15, 2011, showcased a variety of topics presented by speakers with extensive experience applying technology initiatives in the public and private sectors. Topics included...Read More
It was inevitable: the WikiLeaks fallout has led to a White House-ordered review of classified data security.
In a Nov 30, 2010 Federal Computer Week story, it was announced that the White House has instructed federal agencies to immediately evaluate their security practices. The objective: to determine if they have adequate restrictions in place on employees’ access to...Read More
On November 6, 2010, The NY Times ran an article about a security breach at the General Services Agency (GSA). It was not a small breach. One of the GSA’s employees had sent the names and Social Security numbers of the agency’s entire staff to a private email...Read More
We couldn’t agree more. Last month, TalaTek team members attended a conference offered by CyberSecurity Seminars in partnership with Crowell & Moring LLP. It had the intriguing title “FISMA – A New Path Forward.” What we heard was that others were beginning to...Read More
In 2006, we recognized the need for an entirely new approach to risk management, security and compliance in federal IT implementations. That's how TalaTek was born. On the second of September, 2010, we learned that the Government Information Security Leadership...Read More
Layered protection through security design, policies and processes As regulatory compliance and audits increase in frequency and complexity, organizations are motivated to address security now rather than later. Many an IT professional has begun to fret about the...Read More