Press | In the News | Blog

 TalaTek Informational Series

Learn more about TalaTek and the opportunities and issues facing our industry.

Cyber Warfare is On the Rise

Cyber Warfare is On the Rise

Implementing a robust risk management program can help protect organizations from cyber warfare threats.

How Virtual Teams Can Be Successful

How Virtual Teams Can Be Successful

Virtual work or remote work offers upside for both employers and employees. Learn more about the benefits of telecommuting in this article.

Managed Services Can Help Prevent Data Breaches

Managed Services Can Help Prevent Data Breaches

Managed services can help prevent data breaches. Firms should seek outside assistance from industry experts that truly put an institution’s cyber strength to the test and advise on ways to strengthen cyber defenses.

Why an Incident Response Plan is Critical

Why an Incident Response Plan is Critical

Learn about the importance of incident response planning and how it allows an organization to establish a series of best practices to stop or minimize an intrusion before it causes damage.

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Disk-Wiping ‘Shamoon’ Malware Resurfaces With File-Erasing Malware in Tow

Disk-Wiping ‘Shamoon’ Malware Resurfaces With File-Erasing Malware in Tow

As with previous attacks, organizations in the Middle East appear to be main targets, Symantec says. Organizations in the United Arab Emirates and Saudi Arabia are once again being targeted in a new wave of attacks involving Shamoon, a malware strain that was used to destroy more than 30,000 PCs at oil giant Saudi Aramco in 2012.

Disk-Wiping ‘Shamoon’ Malware Resurfaces With File-Erasing Malware in Tow

Before You Commit to a Vendor, Consider Your Exit Strategy

Vendor lock-in. What is it? Vendor lock-in occurs when you adopt a product or service for your business, and then find yourself locked in, unable to easily transition to a competitor's product or service. Vendor lock-in is becoming more prevalent as we migrate from legacy IT models to the plethora of sophisticated cloud services offering rapid scalability and elasticity, while fueling creativity and minimizing costs

Achieving CMMC Compliance: Navigating Uncharted Waters

Achieving CMMC Compliance: Navigating Uncharted Waters

Does your organization do business with the Department of Defense (DoD) and process, store, or transmit Controlled Unclassified Information (CUI)? If so, you probably rushed to create documentation to self-attest NIST SP 800-171 compliance when DoD issued the Defense Federal Acquisitions Regulations System (DFARS) 252.204-7012 back in 2017 to protect CUI confidentiality. Things are …

New Bottleneck Emerges in DOD’s Contractor Cybersecurity Program, Concerning Assessors

Companies in line to become certified assessors for the Department of Defense‘s supply chain cybersecurity program are facing a new roadblock: Getting and passing an assessment of their own. There’s a bottleneck in licensing assessors under the DOD’s Cybersecurity Maturity Model Certification (CMMC), according to multiple organizations …

TalaTek Areas Expertise

Compliance

View Posts »

FedRAMP

View Posts »

Risk Management

View Posts »

Cybersecurity

View Posts »