What is key to improving the ratio of women in cybersecurity?

What is key to improving the ratio of women in cybersecurity?

The biennial (ISC)2 report shows that the percentage of women in cybersecurity remains unchanged. Given the significant shortfall of security talent, what can we learn from this report about how to fix our weak and leaky pipeline?

03/16/17

Don't succumb to security fatalism

Don't succumb to security fatalism

Protecting ourselves online can be incredibly complicated for anyone who isn't an expert, which has led to the current dismal state of security. Now the time for big changes to make things simpler.

01/13/17

Ways to improve security education in the New Year

Ways to improve security education in the New Year

As 2016 comes to a close, there are a few types of security advice we should strive to avoid. With all the inevitable confusion about effective ways of protecting our data and machines, security experts need to make sure the...

12/16/16

Supporting inclusivity in the office

Supporting inclusivity in the office

Many organizations are trying to change the limited demographic of people working in technology, but some are finding the process difficult. Here are a few tips for improving your efforts to hire and retain a wider variety of people.

11/21/16

In defense of “Good Enough” security

In defense of “Good Enough” security

Every few weeks it seems like the list of security technology declared "dead" or broken grows. But are we actually putting ourselves at greater danger by avoiding any technique or product that falls on that list?

08/24/16

Which non-technical skills are most important to a career in security?

Which non-technical skills are most important to a career in security?

You can have all the technical knowledge in the world, but this does not necessarily guarantee a successful career in security. Here are a few non-technical skills that may not be immediately obvious, which will make you stand out as...

07/11/16

Is social media out of touch with how people socialize?

Is social media out of touch with how people socialize?

There's been a lot of discussion about the conditions around why people are sharing less personal content on social media. But is there an aspect of how people socialize that is being left out of the conversation?

04/26/16

In the event of an emergency, you will be prepared

In the event of an emergency, you will be prepared

Preparedness drills for physical safety are commonplace. Why not begin doing the same for digital safety? And what would such a thing entail?

04/07/16

No security experience? Apply anyway

No security experience? Apply anyway

As we're facing an ever-increasing shortage of security personnel, it's time to change our recruitment tactics. Cyber security training is readily available now. Rather than searching at length for the rare individual who is a perfect...

01/08/16

A change in wording could attract more women to infosec

A change in wording could attract more women to infosec

Information security is an endeavor that is frequently described in terms of war. What can we learn from history and from other industries about what a change in verbiage might do to affect the gender balance of this industry?

11/17/15

Can pseudonyms be friendly and authentic?

Can pseudonyms be friendly and authentic?

Facebook has made some significant changes to their username policies to allow people more flexibility in choosing their "authentic name". But there are still plenty of people who are running afoul of the amended rules who use...

07/20/15

Ensuring data security with a bucket of worms and a hammer; goggles optional

Ensuring data security with a bucket of worms and a hammer; goggles optional

Getting in the habit of destroying sensitive data in junk mail and on old drives and devices isn't just about proper use of approved technology. Sometimes what you need is creativity, a sense of humor, and a good fire extinguisher.

06/18/15

For women to avoid 'office housework', work from home

For women to avoid 'office housework', work from home

It can be easy to see how parents, particularly working mothers, might realize benefits of working from home. But there are other, less obvious reasons that women in tech can reap big rewards by choosing to telecommute.

04/28/15

After the Anthem breach: How we can help secure health data

After the Anthem breach: How we can help secure health data

The Anthem breach may have seemed a baffling or inexcusable security lapse. But once you understand what’s going on in healthcare security and technology right now, you can see why this was inevitable and how we can help prevent such...

02/20/15

When good security advice...isn't

When good security advice...isn't

Is there any piece of common security advice that you find you disagree with? Context can often change what we should be telling people about how to secure their data and machines

01/21/15

Going beyond gender for the agenda

Going beyond gender for the agenda

We've all seen tech conference with only male speakers on the agenda. What would it be like to have a conference agenda populated only with women, but not a "women in tech" event? And what can this show us about increasing diversity...

12/18/14

Five security developments we can be thankful for in 2014

Five security developments we can be thankful for in 2014

The end of the year usually brings with it the annual tradition of consulting the InfoSec "crystal ball" to create a list of prognostications of doom for the coming year. Let's start a new tradition of looking back at the things that...

11/18/14

The Paradox of STEM Training

The Paradox of STEM Training

Recent statistics seem to point to an overabundance of STEM graduates, and yet there is negative unemployment in some tech careers. Why the discrepancy between supply and demand?

10/16/14

Myths and truths about employing women in Infosec

Myths and truths about employing women in Infosec

Lisa Myers breaks down the truths and the fallacies behind women in security careers.

09/15/14

Welcome to the Digital Mystique

Welcome to the Digital Mystique

Coming up with the title for a blog is always a tricky process. How do you best explain the direction and purpose in just a couple of words? I chose the name “Digital Mystique” for a number of reasons, which will give you a glimpse...

08/14/14

Load More