Press | In the News | Blog
TalaTek Informational Series
Learn more about TalaTek and the opportunities and issues facing our industry.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Sandbox Technology Can Make Browsing Safer.
The Emerging IT Conference, presented by the National Capital Area Chapter of ISACA on March 15, 2011, showcased a variety of topics presented by speakers with extensive experience applying technology initiatives in the public and private sectors. Topics included...
It was inevitable: the WikiLeaks fallout has led to a White House-ordered review of classified data security.
In a Nov 30, 2010 Federal Computer Week story, it was announced that the White House has instructed federal agencies to immediately evaluate their security practices. The objective: to determine if they have adequate restrictions in place on employees’ access to...
Why an Incident Response Plan is Critical
Learn about the importance of incident response planning and how it allows an organization to establish a series of best practices to stop or minimize an intrusion before it causes damage.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Before You Commit to a Vendor, Consider Your Exit Strategy
Vendor lock-in. What is it? Vendor lock-in occurs when you adopt a product or service for your business, and then find yourself locked in, unable to easily transition to a competitor's product or service. Vendor lock-in is becoming more prevalent as we migrate from legacy IT models to the plethora of sophisticated cloud services offering rapid scalability and elasticity, while fueling creativity and minimizing costs
TalaTek Areas Expertise

Compliance
View Posts »

FedRAMP
View Posts »

Risk Management
View Posts »

Cybersecurity
View Posts »


