Blog
How to Embed Pen Testing into your Software Development Life Cycle
Ensuring security throughout the software development life cycle (SDLC) is more important than ever.
Blog
Cloud Security: 5 Things to Consider When Migrating to the Cloud
Cloud migration strategy is essential for a business’s security. Read about the cloud security factors to consider when migrating to the cloud.
Blog
Tax Season: 7 Ways to Protect Your Business from Hackers
Are you prepared to protect your organization from hackers this tax season?
Blog
Cybersecurity News Flash: Concerns with geopolitical turmoil and warfare in Russia and Ukraine
Understanding the increased risks for cyberattacks as a response to international sanctions.
Blog
How to Move to Zero-Trust Security in 9 Steps
Is your virtual private network (VPN) technology keeping your network safe? It might not be as secure as you think it is.
Blog
The Top 6 Cybersecurity Practices to Kick Off the New Year
There's no better time to review and enhance cybersecurity across your organization. Follow our top six practices to start the year off right.
Blog
7 Best Practices for Penetration Test Planning
As you implement penetration testing in your environment, follow our seven best practices for effective results.
Blog
6 Criteria for Choosing a Managed Detection and Response Provider
As you evaluate MDR providers for your organization, make sure your choice meets the right expertise to strengthen your security posture.
Blog
6 Ways to Protect Against Today’s Top Cyber Threats
To protect your environment from exposure to cyber threats, you must secure it with the right mix of expertise, processes, technologies, and tools.
Blog
5 Reasons You Need Managed Detection and Response Right Now
Learn how to stay ahead of cyberattacks before they happen, as cybercrime rates increase by nearly 600% as a fallout of the COVID-19 pandemic.
Blog
How enterprise cybersecurity teams can mitigate against individual data security complacency
One of the biggest risks that enterprise cybersecurity teams face in 2021 is complacency from company employees.
Blog
Uncharted Territory – Achieving Cyber Success in a Hybrid Work Environment
In the hybrid work model of the near future, business leaders need to keep digital parity in mind.
Blog
Three Ways to Protect Your Company’s Network Infrastructure from Data Exfiltration and the Cost of Inaction
Recently, a user in a low-level hacking forum shared the phone numbers and personal data of roughly 533 million Facebook users.
Blog
How Trustworthy Are Your Third-Party Vendors?
Protect your business by implementing a thorough third-party risk management program (TPRM).
Blog
Meeting The SEC Cybersecurity Disclosure Requirement Through Risk Management and NIST
Learn if your public company is making the right adjustment to comply with SEC Cybersecurity Disclosure Requirement Through Risk Management and NIST.
Blog
Post-Economic Shutdown: Cybersecurity Debrief
How businesses have managed sudden decentralization and the implementation of remote work strategies
Blog
FireEye Hacked! What This Means For The Rest of Us
The recent breach at FireEye is even more evidence that cybersecurity strategies need to emphasize detection, response and recovery
Blog
FireEye Breach: Three Key Lessons
Learn three key lessons from the recent FireEye Breach the latest cybersecurity company to suffer from an attack.
Blog
How to Protect Your Real Estate Business from Cyber Attacks During and After the COVID-19 Pandemic
Real Estate and cybersecurity.
Blog
How Cyber-Secure is Your Remote Workforce? Expert Tips in the Time of COVID-19
Take these cybersecurity measures to help safeguard your business, employees and customers in the midst of the COVID-19 pandemic.
Blog
[COVID-19]: Five Ways to Keep Your Remote Workforce Cyber-Secure
In a national effort to curtail the spread of the coronavirus (COVID-19), we are witnessing the rise of the remote workforce.
Blog
5 Techniques to Get You Ransomware-Ready
Most of us have heard of “ransomware,” but what is it? Who does it impact? How can you protect your business?
Blog
6 Tips to Protect Your Business from Third-Party Vendor Attacks
Check out these tips to help safeguard your business from third-party vendor attacks.
Blog
Digital By Default: Prioritizing Cybersecurity in Your Real Estate Business
As smart cities continually evolve to stay ahead of demand, owners and developers adapt by rapidly digitizing their buildings and transactions.
Blog
Cybersecurity Techniques to Keep You Grounded Against the Winds of Change
Our cybersecurity experts are here to guide you through four powerful techniques to protect your valuable assets.
Blog
Tips on How to Avoid the Cybersecurity Pitfalls of Big Companies in 2018
2018 has proven that even the biggest companies—and government entities— aren’t immune from a growing number of cyber attacks.
Blog
Safe Travels: Cybersecurity Tips for Your Next Journey
No matter the destination, the risk of cyber-attacks soar the moment you hit the road. Here's a few tips on protecting your data while you're abroad.
Blog
The Price of Convenience: How to Protect Your E-commerce Business From Cyber Attacks
With 230.5 million shoppers anticipated by 2021, online shopping provides a direct portal for cyber-attackers to victimize consumers.
Blog
The F.B.I. Urges You to Reboot Your Router
I’s not time to panic yet, but your router, gateway to the internet highway, may be compromised.
Blog
A Look at GDPR Through a Legal Lens
Managing Director of CyZen, Jacob Lehmann, sat with Co-Founder and Managing Partner at XPAN Law Group, Jordan Fischer, to dive into details on GDPR.
Blog
Drop the "BAS": Protecting Building Facilities and Inhabitants from Cyber Attacks
Building automation systems ("BAS") ease property managers’ daily operations.
Blog
K-12 Cybersecurity: Helping Schools Pass the Test
Since January 2016, cybersecurity incidents in Kindergarten through 12th grade public schools across the United States are up 223% year-over-year.
Blog
5 Tips to Keep Cryptocurrency in your Wallet and out of Thieves’ Pockets
Take cybersecurity into your own hands with these five simple tips from CyZen's cybersecurity advisors.
Blog
Phishing for Your W-2: Key Cybersecurity Tips to Avoid Being Caught During Tax Season
Phishing campaigns topped the IRS “Dirty Dozen” List of Tax Scams for 2017.
Blog
“Spectre” and “Meltdown": Tips to Minimize Risk from the Latest Widespread Cybersecurity Threat
Security researchers recently discovered a hardware information flaw in computer processors across millions of devices