News

Press Releases

 

The Roundup – March

APRIL 2, 2020 | ISSUE NO. 2   The Roundup is a bit-sized security newsletter designed to be read during boring meetings while providing you with material to share during your next sales lunch. Zoom Meeting Security Best PracticesAs the workforce moves remote, ...

Attackers Use Texts to Exploit COVID-19

Executive Summary Zyston has noted an increase in cyber attacks in since the COVID-19 outbreak began spreading across the world. Recently, Zyston associates have noted threat actors using text messages to try to trick individuals. Zyston has noted three particular...

Zoom Meeting Security Best Practices

Before the Meeting Set a password for your meeting to ensure only those invited can attend. Disable Join Before Host to ensure only the Host can start and control the meeting. Settings > Schedule Meeting > Join Before Host Create a Waiting Room by enabling the...

COVID-19 Threat Intelligence Report

Executive Summary In response to the global COVID-19 outbreak, many organizations are temporarily moving to remote work. A majority of these firms are not equipped for remote work, but they are being forced into it without preparation. Thus, security gaps are being...

The Roundup – February

FEBRUARY 24, 2020 | ISSUE NO. 1   The Roundup is a bit-sized security newsletter designed to be read during boring meetings while providing you with material to share during your next sales lunch.The Truth Behind Metrics According to the 2019 Verizon Data...

DoD Introduces New Information Security Standard

At the end of January 2020, the U.S. Department of Defense (DoD) approved the Cybersecurity Maturity Model Certification (CMMC) with plans to apply this new standard to up to 3,000 subcontractors by the end of 2020. Unlike prior self-attestation methods, this new...

The Truth Behind Phishing Metrics

According to the 2019 Verizon Data Breach Investigations Report (DBIR), the click rate in phishing simulations is around 3%. Importantly, the DBIR analyzes data across the entire cybersecurity landscape and produces aggregated metrics. Aggregated analysis can provide...

Zyston Principal Jonathan Steenland Presents at ATL CTO Forum

Companies are under equal pressure both to innovate and disrupt the markets they serve while at the same time ensure company assets and customers are protected. What happens when these goals work against each other? Does innovation have to put your company at greater...

In The News 

Data Lakes Security Could Use A Life Preserver

As big data initiatives gain steam at organizations, many companies are creating “data lakes” to provide a large number of users with access to the data they need. And as with almost every type of new IT initiative, this comes with a variety of security risks that...

Meet the C-Suite – Joseph P. Longosz, CFO of Zyston

Welcome to Atlanta Business Chronicle’s “Meet the C-Suite,” where each week we will feature one of the city’s most high profile c-level executives. This week meet Joseph P. Longosz, chief financial officer of Dallas-based Zyston, a cybersecurity advisory and human...

Industry Veterans Launch Security Advisory Firm

Strategic information security advisory firm Zyston on Tuesday announced its official launch of operations. The Dallas, Texas-based company provides tailored solutions that enable organizations across the globe to make informed, intelligent decisions related to the...

Global Security Veterans Launch Cyber Advisory Firm Zyston

A group of veterans in security and information technology have teamed up to launch a Dallas cyber security service firm. Zyston LLC, a security advisory firm founded in May, boasts an executive team that includes the former chief information security officer at...

New Information Security Advisory Firm Launches in Dallas

Prominent names in the cybersecurity industry have come together to form Zyston, a new Dallas-based security firm advising organizations globally on how to best protect their company’s information. Zyston was funded by $3.7 million in Series A financing. The company...