Press | In the News | Blog
TalaTek Informational Series
Learn more about TalaTek and the opportunities and issues facing our industry.
Updating the Keys for DNS Security
NIST’s September ITL Bulletin provides an overview of DNSSEC protocol and validation keys, the key change timeline, and what DNS administrators need to know about DNSSEC validation.
Even your Drone Can Be Hacked!
Did you know that even your drone can be hacked? It’s not just your company website, your personal bank accounts or your home security system that are at risk. Donny Wadyka and Brian Thiellen, from TalaTek, to always provide the most current risk management counsel to their clients, attended the 25th annual DefCon conference in …
Understanding NIST Digital Identity Guidelines
NIST has released its August ITL Bulletin on digital identity guidelines. It serves as a primer on NIST SP 800-63-3, Digital Identity Guidelines, published June in a four-part suite covering technical protocols for digital authentication of users to federal …
Webinar: Risk Management Approach to Cyber Insecurity
Join us August 23rd at 11:00am ET as we present A Risk Management Approach to Cyber Insecurity. We’re excited to be part of the webinar series on Cybersecurity Risk Management hosted by our …
The Impact of the NIST SP 800-64r2 Withdrawal on the System Development Life Cycle
TalaTek client Chris Fillebrown, lead systems engineer for the Human Genome Sequencing Center, Baylor College of Medicine, examines why NIST withdrew NIST Special Publication 800-64r-2 and adopted NIST SP 800-160v1 in its place. looks at the upside of remote work for employees and employers alike.
Keeping Remote Workers Safe and Happy
TalaTek looks at the upside of remote work for employees and employers alike.
Five Ways to Integrate DEI into Virtual Workplace Practices
Learn diversity, equity, and inclusion (DEI) best practices when working remotely with these tips from TalaTek, an integrated risk management firm, that exclusively embraces a remote workforce.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Women know Cyber
The trailblazing women featured in this book represent the best of what our collective action against cybercrime can be. They have committed themselves to the mission of keeping our country safe from those who would do us harm and are on the front lines every day fighting everything from extortion and theft to espionage and data manipulation …
Stakeholder Management: Push or Pull?
Managing IT projects can be a bit art and a bit science. Learn how to move projects along by building trust through helpful insights from Ken Russman of TalaTek.
Next generation controls for information systems and organizations now includes key focus on privacy
The National Institute of Standards and Technology (NIST) released its draft version of Revision 5 of Special Publication (SP) 800-53, Security and Privacy Controls for Information Systems and Organizations, in late March 2020 …
TalaTek Areas Expertise

Compliance
View Posts »

FedRAMP
View Posts »

Risk Management
View Posts »

Cybersecurity
View Posts »


