Press | In the News | Blog
TalaTek Informational Series
Learn more about TalaTek and the opportunities and issues facing our industry.
Cyber Warfare is On the Rise
Implementing a robust risk management program can help protect organizations from cyber warfare threats.
How Virtual Teams Can Be Successful
Virtual work or remote work offers upside for both employers and employees. Learn more about the benefits of telecommuting in this article.
Managed Services Can Help Prevent Data Breaches
Managed services can help prevent data breaches. Firms should seek outside assistance from industry experts that truly put an institution’s cyber strength to the test and advise on ways to strengthen cyber defenses.
Why an Incident Response Plan is Critical
Learn about the importance of incident response planning and how it allows an organization to establish a series of best practices to stop or minimize an intrusion before it causes damage.
TalaTek Supports First Annual Smart City Challenge
TalaTek takes a look back at the Smart City Challenge 2021 and what sponsoring the event mean to founder and president Baan Alsinawi.
The State of Cybersecurity Under the Biden-Harris Administration
TalaTek takes a look back and ahead with what’s to come for cybersecurity under the Biden-Harris administration.
The Current State of Russian-Sponsored Cyber Warfare
The cyberthreat from the Ukraine/Russia conflict is ongoing. U.S. businesses must take action now and stay vigilant. Learn more in this blog.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Disk-Wiping ‘Shamoon’ Malware Resurfaces With File-Erasing Malware in Tow
As with previous attacks, organizations in the Middle East appear to be main targets, Symantec says. Organizations in the United Arab Emirates and Saudi Arabia are once again being targeted in a new wave of attacks involving Shamoon, a malware strain that was used to destroy more than 30,000 PCs at oil giant Saudi Aramco in 2012.
Avoid Coal in Your Digital Stocking — Here’s How to Improve Your Security Posture in 2019
Find the latest security analysis and insight from top IT security experts and leaders, made exclusively for security professionals and CISOs
Is the NIST Cybersecurity Framework Enough to Protect Your Organization?
The National Institute of Standards and Technology (NIST) Cybersecurity Framework, also known as the Framework for Improving Critical Infrastructure Cybersecurity and commonly referred to as CSF, is top of mind for many organizations.
Before You Commit to a Vendor, Consider Your Exit Strategy
Vendor lock-in. What is it? Vendor lock-in occurs when you adopt a product or service for your business, and then find yourself locked in, unable to easily transition to a competitor's product or service. Vendor lock-in is becoming more prevalent as we migrate from legacy IT models to the plethora of sophisticated cloud services offering rapid scalability and elasticity, while fueling creativity and minimizing costs
MSSP Merger: CISO Global, TalaTek Risk Management Join Together
Managed security services provider (MSSP) CISO Global & TalaTek risk management merge to support federal government & private sector organizations …
Achieving CMMC Compliance: Navigating Uncharted Waters
Does your organization do business with the Department of Defense (DoD) and process, store, or transmit Controlled Unclassified Information (CUI)? If so, you probably rushed to create documentation to self-attest NIST SP 800-171 compliance when DoD issued the Defense Federal Acquisitions Regulations System (DFARS) 252.204-7012 back in 2017 to protect CUI confidentiality. Things are …
New Bottleneck Emerges in DOD’s Contractor Cybersecurity Program, Concerning Assessors
Companies in line to become certified assessors for the Department of Defense‘s supply chain cybersecurity program are facing a new roadblock: Getting and passing an assessment of their own. There’s a bottleneck in licensing assessors under the DOD’s Cybersecurity Maturity Model Certification (CMMC), according to multiple organizations …
TalaTek Areas Expertise

Compliance
View Posts »

FedRAMP
View Posts »

Risk Management
View Posts »

Cybersecurity
View Posts »


