Press | In the News | Blog

 TalaTek Informational Series

Learn more about TalaTek and the opportunities and issues facing our industry.

FOSE 2011 Report: Continuous Monitoring – More than technical controls.

By Mollie Jewell, CISSP TalaTek began delivering FISMA continuous monitoring risk management services to its clients in 2008. At that time, this was something very few paid much attention to, and for the most part compliance efforts ended by signing the certification...

The White House wants DHS to play a larger role in cybersecurity.

The administration is serious. In one of the first signs of how seriously the current administration takes cybercrime, on May 12 the White House sent its cybersecurity legislation to Capitol Hill, asking for changes in the law. Specifically, the White House wants the...

Sandbox Technology Can Make Browsing Safer.

The Emerging IT Conference, presented by the National Capital Area Chapter of ISACA on March 15, 2011, showcased a variety of topics presented by speakers with extensive experience applying technology initiatives in the public and private sectors. Topics included...

Managed Services Can Help Prevent Data Breaches

Managed Services Can Help Prevent Data Breaches

Managed services can help prevent data breaches. Firms should seek outside assistance from industry experts that truly put an institution’s cyber strength to the test and advise on ways to strengthen cyber defenses.

Why an Incident Response Plan is Critical

Why an Incident Response Plan is Critical

Learn about the importance of incident response planning and how it allows an organization to establish a series of best practices to stop or minimize an intrusion before it causes damage.

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Is the NIST Cybersecurity Framework Enough to Protect Your Organization?

Before You Commit to a Vendor, Consider Your Exit Strategy

Vendor lock-in. What is it? Vendor lock-in occurs when you adopt a product or service for your business, and then find yourself locked in, unable to easily transition to a competitor's product or service. Vendor lock-in is becoming more prevalent as we migrate from legacy IT models to the plethora of sophisticated cloud services offering rapid scalability and elasticity, while fueling creativity and minimizing costs

Achieving CMMC Compliance: Navigating Uncharted Waters

Achieving CMMC Compliance: Navigating Uncharted Waters

Does your organization do business with the Department of Defense (DoD) and process, store, or transmit Controlled Unclassified Information (CUI)? If so, you probably rushed to create documentation to self-attest NIST SP 800-171 compliance when DoD issued the Defense Federal Acquisitions Regulations System (DFARS) 252.204-7012 back in 2017 to protect CUI confidentiality. Things are …

TalaTek Areas Expertise

Compliance

View Posts »

FedRAMP

View Posts »

Risk Management

View Posts »

Cybersecurity

View Posts »