Press | In the News | Blog
TalaTek Informational Series
Learn more about TalaTek and the opportunities and issues facing our industry.
FOSE 2011 Report: Continuous Monitoring – More than technical controls.
By Mollie Jewell, CISSP TalaTek began delivering FISMA continuous monitoring risk management services to its clients in 2008. At that time, this was something very few paid much attention to, and for the most part compliance efforts ended by signing the certification...
The White House wants DHS to play a larger role in cybersecurity.
The administration is serious. In one of the first signs of how seriously the current administration takes cybercrime, on May 12 the White House sent its cybersecurity legislation to Capitol Hill, asking for changes in the law. Specifically, the White House wants the...
Sandbox Technology Can Make Browsing Safer.
The Emerging IT Conference, presented by the National Capital Area Chapter of ISACA on March 15, 2011, showcased a variety of topics presented by speakers with extensive experience applying technology initiatives in the public and private sectors. Topics included...
It was inevitable: the WikiLeaks fallout has led to a White House-ordered review of classified data security.
In a Nov 30, 2010 Federal Computer Week story, it was announced that the White House has instructed federal agencies to immediately evaluate their security practices. The objective: to determine if they have adequate restrictions in place on employees’ access to...
Managed Services Can Help Prevent Data Breaches
Managed services can help prevent data breaches. Firms should seek outside assistance from industry experts that truly put an institution’s cyber strength to the test and advise on ways to strengthen cyber defenses.
Why an Incident Response Plan is Critical
Learn about the importance of incident response planning and how it allows an organization to establish a series of best practices to stop or minimize an intrusion before it causes damage.
The State of Cybersecurity Under the Biden-Harris Administration
TalaTek takes a look back and ahead with what’s to come for cybersecurity under the Biden-Harris administration.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Is the NIST Cybersecurity Framework Enough to Protect Your Organization?
The National Institute of Standards and Technology (NIST) Cybersecurity Framework, also known as the Framework for Improving Critical Infrastructure Cybersecurity and commonly referred to as CSF, is top of mind for many organizations.
Before You Commit to a Vendor, Consider Your Exit Strategy
Vendor lock-in. What is it? Vendor lock-in occurs when you adopt a product or service for your business, and then find yourself locked in, unable to easily transition to a competitor's product or service. Vendor lock-in is becoming more prevalent as we migrate from legacy IT models to the plethora of sophisticated cloud services offering rapid scalability and elasticity, while fueling creativity and minimizing costs
Achieving CMMC Compliance: Navigating Uncharted Waters
Does your organization do business with the Department of Defense (DoD) and process, store, or transmit Controlled Unclassified Information (CUI)? If so, you probably rushed to create documentation to self-attest NIST SP 800-171 compliance when DoD issued the Defense Federal Acquisitions Regulations System (DFARS) 252.204-7012 back in 2017 to protect CUI confidentiality. Things are …
TalaTek Areas Expertise

Compliance
View Posts »

FedRAMP
View Posts »

Risk Management
View Posts »

Cybersecurity
View Posts »


