Press | In the News | Blog
TalaTek Informational Series
Learn more about TalaTek and the opportunities and issues facing our industry.
How Small and Medium Businesses Can Leverage Cybersecurity for Client Value: Six Ways to Get Started
Small to medium sized businesses can extract client value from implementing cybersecurity best practices. Ken Russman of TalaTek helps guide SMBs by sharing six ways to get started.
The Importance of Performing GAP Analysis
TalaTek outlines the benefits of gap analysis for cybersecurity programs.
How can federal agencies objectively rate their vendors?
TalaTek explores how federal agencies can best rate their vendors using CPARS by Diane Weeks, Information Assurance Consultant and Project Manager, TalaTek
TalaTek attends Open Source SEC 2019 Conference
TalaTek CTO Joshua Grove recently attended the Open Source Security (OSSEC) conference with security and DevOp professionals from around the globe to discuss best practices and the future of OSSEC.
AWS Audit Manager for AWS Cloud to Integrate with TiGRIS
Keeping track of compliance in the AWS Cloud just got easier. It will now be integrated and available with TalaTek’s risk-management platform TiGRIS.
How to Comply with the Department of Defense Interim Ruling: 800-171 Self-Assessment and Scoring
Learn how to comply with the Department of Defense interim ruling: 800-171 Self-Assessment and Scoring that takes effect on November 30, 2020.
How To Rebuild An Organization’s Reputation And Regain Trust After A Data Breach
Data breaches can negatively impact a company’s reputation. TalaTek offers four steps for protecting an organization’s reputation and limiting damage caused by data breaches.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
FedRAMP: Friend or Foe for Cloud Security?
Cloud security is on everyone’s minds these days. You can’t go a day without reading about an organization either planning its move to the cloud or actively deploying a cloud-based architecture. A great example is the latest news about the US Department of Defense and its ongoing move to the cloud.
First Things First: Know Your Data
It’s been three years since the U.S. Office of Personnel Management’s (OPM) two data breaches shocked the country and spawned immediate cyber initiatives in response to the theft of millions of highly sensitive records –possibly now resulting in identity fraud, as reported by the Wall Street Journal. In the months that followed, the nation’s agencies were required to make an honest accounting of vital systems and the state of their security …
Disk-Wiping ‘Shamoon’ Malware Resurfaces With File-Erasing Malware in Tow
As with previous attacks, organizations in the Middle East appear to be main targets, Symantec says
Defense Contractor Certification Body Says Maintenance of Companies’ Cybersecurity Posture is Within its Role
The accreditation body overseeing the Defense Department’s cybersecurity certification for prospective contractors is also authorized to provide certified companies with cybersecurity services, according to members of the group’s board of directors. “A continuous monitoring capability could provide benefits to …
How businesses can view the Pentagon’s new cybersecurity standards
CMMC has become one of the looming issues for defense contractors as the Pentagon looks to fortify, not only its own networks, but those of the defense industrial base. In this op-ed, Johann Dettweiler, director of operations at TalaTek, a risk management firm, offers a frequently asked questions on how business leaders should think about this program.
Using AWS for compliance with Internal Revenue Service (IRS) Publication 1075
Internal Revenue Service Publication 1075 (IRS 1075) provides guidance for US government agencies, agents, and contractors that access Federal Tax Information (FTI), to make sure they use policies, practices, controls, and safeguards to protect FTI confidentiality and integrity of FTI throughout its lifecycle. FTI consists of federal tax returns and return information, and may contain personally identifiable information (PII) such as the taxpayer’s identity, and the nature, source, or …
TalaTek Areas Expertise

Compliance
View Posts »

FedRAMP
View Posts »

Risk Management
View Posts »

Cybersecurity
View Posts »


