Press | In the News | Blog

 TalaTek Informational Series

Learn more about TalaTek and the opportunities and issues facing our industry.

Cyber Warfare is Now a Daily Threat in 2021

Cyber Warfare is Now a Daily Threat in 2021

Recent state-sponsored cyberattacks prove that cyber espionage campaigns are targeting the public and private sectors with increasing sophistication and scale. Learn what you can do.

How to Work with the C-Suite to Ensure Proper Cybersecurity Resourcing

How to Work with the C-Suite to Ensure Proper Cybersecurity Resourcing

Learn best practices for working with the C-suite for proper cybersecurity budget and resourcing needs. – As the United States (and the world) experiences rising costs in food, gas, and housing; the stock market remains volatile; and major banks such as Citigroup raise global recession concerns, companies are watching their balance sheets closely. At the same time, organizations face the potential of new state-sponsored …

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

TiGRIS from TalaTek is now available in AWS Marketplace

TiGRIS from TalaTek is now available in AWS Marketplace

– TalaTek, an integrated risk management firm, today announced that its flagship governance, risk management, and compliance (GRC) solution, the TalaTek intelligent Governance and Risk Integrated Solution (TiGRIS) is available for purchase in AWS Marketplace. Amazon Web Services (AWS) customers

5 Strategies SMBs Should Follow to Strengthen Cybersecurity

5 Strategies SMBs Should Follow to Strengthen Cybersecurity

Cybersecurity might seem like a huge challenge for a small and mid-sized business (SMB). But there are many strategies SMBs can implement quickly and relatively inexpensively to reduce cyber risks. In recognition of Cybersecurity Awareness month, Thomas Wolfe, head of strategic development for TalaTek outlines five key tactics …

Policy Compliance: OneSize Does Not Fit All

Policy Compliance: OneSize Does Not Fit All

How do we get our brains around the arcane topic of policy compliance? Security pros define compliance as adhering to established rules and regulations, codes of conduct, laws, or organizational standards of conduct. For the cybersecurity industry, this means following guidelines established

TalaTek Announces Merger Agreement with CISO Global

TalaTek Announces Merger Agreement with CISO Global

TalaTek, an integrated risk management firm, announced a definitive merger agreement with CISO Global Corporation, a cybersecurity consulting and managed services company. Under the terms of the transaction, TalaTek is now a wholly-owned subsidiary of CISO Global and will continue to focus on providing …

Trust Ourselves and be Courageous by Baan Alsinawi

Trust Ourselves and be Courageous by Baan Alsinawi

Managing Director at Ciso Global, Chief Compliance Officer and the President of TalaTek, Baan Alsinawi shares her cybersecurity journey from a teenager who wanted to understand computers and held several positions in IT from help desk to systems engineering and cybersecurity. Founding her own business focusing on compliance, Baan says she spends maybe only 20% of her day on technical tasks and that there is always so more to do. Finding the right …

How to Select a Cybersecurity Framework to Protect your Greatest Assets: People, Property and Data

How to Select a Cybersecurity Framework to Protect your Greatest Assets: People, Property and Data

A fact of doing business in today’s hyper-internet-connected world is the need for organizations, regardless of size or sector, to protect their enterprises against a constant onslaught of malicious actors, insider threats, and a slew of other cybersecurity risks. It’s more a matter of “when,” not “if” your organization will face an attack. Fortunately, cybersecurity frameworks have been developed that comprise best practices, standards, and guidelines designed to manage risks and combat these threats so you can protect your

Let the dust settle on CMMC 2.0

Let the dust settle on CMMC 2.0

For the past several months, there has been a frantic scrambling by all stakeholders involved in the Cybersecurity Maturity Model Certification (CMMC) program — the Accreditation Body (AB), the Defense Department, the third-party assessment organizations (C3PAO) and defense industrial base (DIB) vendors — to determine the best path forward to secure the

TalaTek Areas Expertise

Compliance

View Posts »

FedRAMP

View Posts »

Risk Management

View Posts »

Cybersecurity

View Posts »