Lysa Myers

Security Researcher

Opinions expressed by ICN authors are their own.

Lysa Myers began her tenure in malware research labs in the weeks before the Melissa virus outbreak in 1999. She has watched both the malware landscape and the security technologies used to prevent threats from growing and changing dramatically. Because keeping up with all this change can be difficult for even the most tech-savvy users, she enjoys explaining security issues in an approachable manner for companies and consumers alike. Over the years, Myers has worked both within antivirus research labs, finding and analyzing new malware, and within the third-party testing industry to evaluate the effectiveness of security products. As a security researcher for ESET, she focuses on providing practical analysis and advice of security trends and events.

The opinions expressed in this blog are those of Lysa Myers and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Why go to women-focused technology events?

Three shoddy security tropes it's time to retire

Three shoddy security tropes it's time to retire

It's not unusual for our collective cultural or technological understanding to discredit certain tropes over time. Tired cliches about shoddy security practices have been especially slow to be moved to the ash heap of history. Here...

What is key to improving the ratio of women in cybersecurity?

What is key to improving the ratio of women in cybersecurity?

The biennial (ISC)2 report shows that the percentage of women in cybersecurity remains unchanged. Given the significant shortfall of security talent, what can we learn from this report about how to fix our weak and leaky pipeline?

Don't succumb to security fatalism

Don't succumb to security fatalism

Protecting ourselves online can be incredibly complicated for anyone who isn't an expert, which has led to the current dismal state of security. Now the time for big changes to make things simpler.

Ways to improve security education in the New Year

Ways to improve security education in the New Year

As 2016 comes to a close, there are a few types of security advice we should strive to avoid. With all the inevitable confusion about effective ways of protecting our data and machines, security experts need to make sure the...

Supporting inclusivity in the office

Supporting inclusivity in the office

Many organizations are trying to change the limited demographic of people working in technology, but some are finding the process difficult. Here are a few tips for improving your efforts to hire and retain a wider variety of people.

In defense of “Good Enough” security

In defense of “Good Enough” security

Every few weeks it seems like the list of security technology declared "dead" or broken grows. But are we actually putting ourselves at greater danger by avoiding any technique or product that falls on that list?

Which non-technical skills are most important to a career in security?

Which non-technical skills are most important to a career in security?

You can have all the technical knowledge in the world, but this does not necessarily guarantee a successful career in security. Here are a few non-technical skills that may not be immediately obvious, which will make you stand out as...

Is social media out of touch with how people socialize?

Is social media out of touch with how people socialize?

There's been a lot of discussion about the conditions around why people are sharing less personal content on social media. But is there an aspect of how people socialize that is being left out of the conversation?

In the event of an emergency, you will be prepared

In the event of an emergency, you will be prepared

Preparedness drills for physical safety are commonplace. Why not begin doing the same for digital safety? And what would such a thing entail?

No security experience? Apply anyway

No security experience? Apply anyway

As we're facing an ever-increasing shortage of security personnel, it's time to change our recruitment tactics. Cyber security training is readily available now. Rather than searching at length for the rare individual who is a perfect...

A change in wording could attract more women to infosec

A change in wording could attract more women to infosec

Information security is an endeavor that is frequently described in terms of war. What can we learn from history and from other industries about what a change in verbiage might do to affect the gender balance of this industry?

Load More