Press | In the News | Blog
TalaTek Informational Series
Learn more about TalaTek and the opportunities and issues facing our industry.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Eight-Point Plan to Bolster Defenses in the New Age of Cyberwarfare
Last Thursday, the administration announced that the U.S. will now officially act to deter and respond to cyberattacks with offensive actions against foreign adversaries. Leaving the politics aside, a calculated look at the potential impact of this policy change raises the specter of a massive escalation in cyberattacks and counter attacks.
IT Audit Should Consider These Third-Party Risk Traps
Third-party risk management can be seen as the Russian nesting doll of challenges when it comes to information security, compliance, and certainly ….
How to prepare for the Cybersecurity Maturity Model Certification
The Cybersecurity Maturity Model Certification (CMMC) will mandate all DOD-contracting firms be compliant with CMMC standards, and those that are not may be shut out of DOD business.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Skanska selects third-party cybersecurity firm
Because construction managers must oversee many physical assets, from materials and vehicles to personnel, something as nonsubstantive as data can easily be overlooked as an asset to protect, Dettweiler told Construction Dive. However, data such as employee social security numbers, building plans or construction time frames is easily exploitable …
TalaTek Areas Expertise

Compliance
View Posts »

FedRAMP
View Posts »

Risk Management
View Posts »

Cybersecurity
View Posts »


